TP-Link T1700G-28TQ T1700G-28TQ V1 CLI Reference Guide - Page 83
ip dhcp snooping trust, 9 ip dhcp snooping mac-verify
View all TP-Link T1700G-28TQ manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 83 highlights
11.8 ip dhcp snooping trust Description The ip dhcp snooping trust command is used to configure a port to be a Trusted Port. Only the Trusted Port can receive the DHCP packets from DHCP servers. To turn the port back to a distrusted port, please use no ip dhcp snooping trust command. Syntax ip dhcp snooping trust no ip dhcp snooping trust Command Mode Interface Configuration Mode (interface gigabitEthernet / interface range gigabitEthernet / interface ten-gigabitEthernet / interface range ten-gigabitEthernet) Example Configure the Gigabit Ethernet port 1/0/2 to be a Trusted Port: T1700G-28TQ(config)#interface gigabitEthernet 1/0/2 T1700G-28TQ(config-if)#ip dhcp snooping trust 11.9 ip dhcp snooping mac-verify Description The ip dhcp snooping mac-verify command is used to enable the MAC Verify feature. To disable the MAC Verify feature, please use no ip dhcp snooping mac-verify command. There are two fields of the DHCP packet containing the MAC address of the Host. The MAC Verify feature is to compare the two fields and discard the packet if the two fields are different. Syntax ip dhcp snooping mac-verify no ip dhcp snooping mac-verify 69