Netgear GS724Tv4 Software Administration Manual - Page 71

Interface Configuration, To con DHCP snooping interface settings, System, Services

Page 71 highlights

GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches Interface Configuration Use the DHCP Snooping Interface Configuration screen to view and configure each port as a trusted or untrusted port. Any DHCP responses received on a trusted port are forwarded. If a port is configured as untrusted, any DHCP (or BootP) responses received on that port are discarded.  To configure DHCP snooping interface settings: 1. Select System > Services > DHCP Snooping > Interface Configuration. 2. Select one or more ports or LAGs to configure. For information about how to select and configure one or more ports and LAGs, see Configuring Interface Settings on page 28. 3. From the Trust Mode list, select the desired trust mode. • Disabled. The interface is considered to be untrusted and could potentially be used to launch a network attack. DHCP server messages are checked against the bindings database. On untrusted ports, DHCP snooping enforces the following security rules: - DHCP packets from a DHCP server (DHCPOFFER, DHCPACK, DHCPNAK, DHCPRELEASEQUERY) are dropped. - DHCPRELEASE and DHCPDECLINE messages are dropped if the MAC address is in the snooping database but the binding's interface is other than the interface where the message was received. - DHCP packets are dropped when the source MAC address does not match the client hardware address if MAC address validation is globally enabled. • Enabled. The interface is considered to be trusted and forwards DHCP server messages without validation. 4. From the Logging Invalid Packets list, select the packet logging mode. When enabled, the DHCP snooping feature generates a log message when an invalid packet is received and dropped by the interface. 5. In the Rate Limit (pps) field, specify the rate limit value for DHCP snooping purposes. If the incoming rate of DHCP packets exceeds the value of this object for consecutively burst interval seconds, the port will be shut down. If this value is N/A, then the burst interval has no meaning, and rate limiting is disabled. 6. In the Burst Interval (secs) field, specify the burst interval value for rate limiting purposes on this interface. If the rate limit is N/A, then the burst interval has no meaning and the field displays N/A. 7. Click the Apply button. Configure System Information 71

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290

Configure System Information
71
GS716Tv3, GS724Tv4, and GS748Tv5 Smart Switches
Interface Configuration
Use the DHCP Snooping Interface Configuration screen to view and configure each port as a
trusted or untrusted port. Any DHCP responses received on a trusted port are forwarded. If a
port is configured as untrusted, any DHCP (or BootP) responses received on that port are
discarded.
To configure DHCP snooping interface settings:
1.
Select
System
>
Services
>
DHCP Snooping
>
Interface Configuration
.
2.
Select one or more ports or LAGs to configure.
For information about how to select and configure one or more ports and LAGs, see
Configuring Interface Settings
on page 28.
3.
From the Trust Mode list, select the desired trust mode.
Disabled
. The interface is considered to be untrusted and could potentially be used
to launch a network attack. DHCP server messages are checked against the bindings
database. On untrusted ports, DHCP snooping enforces the following security rules:
-
DHCP packets from a DHCP server (DHCPOFFER, DHCPACK, DHCPNAK,
DHCPRELEASEQUERY) are dropped.
-
DHCPRELEASE and DHCPDECLINE messages are dropped if the MAC address
is in the snooping database but the binding’s interface is other than the interface
where the message was received.
-
DHCP packets are dropped when the source MAC address does not match the
client hardware address if MAC address validation is globally enabled.
Enabled
. The interface is considered to be trusted and forwards DHCP server
messages without validation.
4.
From the Logging Invalid Packets list, select the packet logging mode.
When enabled, the DHCP snooping feature generates a log message when an invalid
packet is received and dropped by the interface.
5.
In the Rate Limit (pps) field, specify the rate limit value for DHCP snooping purposes.
If the incoming rate of DHCP packets exceeds the value of this object for consecutively
burst interval seconds, the port will be shut down. If this value is N/A, then the burst
interval has no meaning, and rate limiting is disabled.
6.
In the Burst Interval (secs) field, specify the burst interval value for rate limiting purposes on
this interface.
If the rate limit is N/A, then the burst interval has no meaning and the field displays N/A.
7.
Click the
Apply
button.