TP-Link T2500-28TCTL-SL5428E T2500-28TCUN V1 User Guide - Page 219
DHCP Cheating Attack Implementation Procedure
View all TP-Link T2500-28TCTL-SL5428E manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 219 highlights
Figure 13-7 DHCP Cheating Attack Implementation Procedure DHCP Snooping feature only allows the port connected to the DHCP Server as the trusted port to forward DHCP packets and thereby ensures that users get proper IP addresses. DHCP Snooping is to monitor the process of the Host obtaining the IP address from DHCP server, and record the IP address, MAC address, VLAN and the connected Port number of the Host for automatic binding. The bound entry can cooperate with the ARP Inspection, IP Source Guard and the other security protection features. DHCP Snooping feature prevents the network from the DHCP Server Cheating Attack by discarding the DHCP packets on the distrusted port, so as to enhance the network security. 209
209
Figure 13-7 DHCP Cheating Attack Implementation Procedure
DHCP Snooping feature only allows the port connected to the DHCP Server as the trusted port to
forward DHCP packets and thereby ensures that users get proper IP addresses. DHCP Snooping
is to monitor the process of the Host obtaining the IP address from DHCP server, and record the IP
address, MAC address, VLAN and the connected Port number of the Host for automatic binding.
The bound entry can cooperate with the ARP Inspection, IP Source Guard and the other security
protection features. DHCP Snooping feature prevents the network from the DHCP Server
Cheating Attack by discarding the DHCP packets on the distrusted port, so as to enhance the
network security.