Netgear GS752TS GS7xxTS-TPS Software Admin Manual - Page 94

Interface Configuration, System, Services, DHCP Snooping, Trust Mode, Enable, Disable

Page 94 highlights

GS728TS, GS728TPS, GS752TS, and GS752TPS Gigabit Smart Switches Interface Configuration Use the DHCP Snooping Interface Configuration page to view and configure each port or LAG as trusted or untrusted. Any DHCP responses received on a trusted port are forwarded. If a port is configured as untrusted, any DHCP (or BootP) responses received on that port are discarded. To access the DHCP Snooping Interface Configuration page, click System> Services > DHCP Snooping > Interface Configuration. To configure DHCP snooping settings for an interface: 1. To configure DHCP snooping settings for a physical port, click the unit ID of the stack member with the ports to configure. 2. To configure DHCP snooping settings for a Link Aggregation Group (LAG), click LAGS. 3. To configure DHCP snooping settings for both physical ports and LAGs, click ALL. 4. Select the check box next to the port or LAG to configure. You can select multiple ports and LAGs to apply the same setting to the selected interfaces. Select the check box in the heading row to apply the same settings to all interfaces. 5. Choose the Trust Mode for the selected port(s) or LAG(s). • Enable: Any DHCP responses received on this port are forwarded. The port connected downstream from the authorized DHCP server should be configured as a trusted port. Any DHCP responses received on a trusted port are forwarded. All other ports should be configured as untrusted. Any DHCP (or BootP) responses received are discarded. • Disable: Any DHCP (or BootP) responses received on this port are discarded. Ports connected to hosts should be configured as untrusted. This is the default value. 6. Use the Logging Invalid Packets menu to choose whether to log invalid packets. When enabled, the DHCP snooping application sends a log message to the buffered log to record invalid packets received on this interface. The factory default is disabled. 94

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329

94
GS728TS, GS728TPS, GS752TS, and GS752TPS Gigabit Smart Switches
Interface Configuration
Use the DHCP Snooping Interface Configuration page to view and configure each port or
LAG as trusted or untrusted. Any DHCP responses received on a trusted port are forwarded.
If a port is configured as untrusted, any DHCP (or BootP) responses received on that port are
discarded.
To access the DHCP Snooping Interface Configuration page, click
System
>
Services
>
DHCP Snooping
>
Interface Configuration
.
To configure DHCP snooping settings for an interface:
1.
To configure DHCP snooping settings for a physical port, click the unit ID of the stack
member with the ports to configure.
2.
To configure DHCP snooping settings for a Link Aggregation Group (LAG), click
LAGS
.
3.
To configure DHCP snooping settings for both physical ports and LAGs, click
ALL
.
4.
Select the check box next to the port or LAG to configure. You can select multiple ports and
LAGs to apply the same setting to the selected interfaces. Select the check box in the
heading row to apply the same settings to all interfaces.
5.
Choose the
Trust Mode
for the selected port(s) or LAG(s).
Enable
: Any DHCP responses received on this port are forwarded. The port
connected downstream from the authorized DHCP server should be configured as a
trusted port. Any DHCP responses received on a trusted port are forwarded. All other
ports should be configured as untrusted. Any DHCP (or BootP) responses received
are discarded.
Disable
: Any DHCP (or BootP) responses received on this port are discarded. Ports
connected to hosts should be configured as untrusted. This is the default value.
6.
Use the
Logging Invalid Packets
menu to choose whether to log invalid packets. When
enabled, the DHCP snooping application sends a log message to the buffered log to record
invalid packets received on this interface. The factory default is disabled.