DHCP Snooping 1

Topology

Tasks:

IP connectivity is established. The DHCP server is fully configured and inaccessible. Configure DHCP snooping on SW1 as follows:

  1. Enable DHCP Snooping on VLAN 10.
  2. Enable MAC-Address verification for DHCP snooping.
  3. Disable data insertion to prevent DHCP relay agent information from being added.
  4. Configure the trusted interface.
  5. Verify the configuration by allowing PC1 to receive IP address from the DHCP server.

Solution:

Task 1: Enable DHCP Snooping on VLAN 10.

SW1#configure terminal
SW1(config)#ip dhcp snooping
SW1(config)#ip dhcp snooping vlan 10

ip dhcp snooping: Activates DHCP Snooping globally on the switch.
ip dhcp snooping vlan 10: Enables DHCP Snooping specifically for VLAN 10.

 

Task 2: Enable MAC-Address verification for DHCP snooping.

SW1(config)#ip dhcp snooping verify mac-address

This ensures that the source MAC address in DHCP packets matches the client’s MAC address recorded in the binding table.

 

Task 3: Disable data insertion to prevent DHCP relay agent information from being added.

DHCP option-82 adds additional information to the DHCP request packets before forwarding them to the DHCP server.

SW1(config)#no ip dhcp snooping information option

This prevents the insertion of DHCP Option-82 relay agent information in DHCP packets to enhance security.

 

Task 4: Configure the trusted interface.

A trusted interface in DHCP snooping is the uplink interface which is connected to or leads to the known DHCP server. By marking the interface as trusted, DHCP responses will be allowed through this port.

SW1(config)#interface GigabitEthernet0/1

SW1(config-if)#ip dhcp snooping trust

SW1(config-if)#end

 

Task 5: Verify the configuration by allowing PC1 to obtain a valid IP address from the DHCP server.

PC1 should have a link-local address configured by default. We need to renew the IP configuration.

PC1:\>ipconfig /renew

IP Address.................: 192.168.1.2

Subnet Mask................: 255.255.255.0

Default Gateway............: 192.168.1.1

DNS Server.................: 192.168.1.1

 

Now exit configuration mode and save the configuration.

SW1(config)#end
SW1#write memory

 

Packet Tracer File

Clicking this button will begin the download of a ZIP file. Inside the ZIP file, you'll find a Packet Tracer Activity (.pka) file, which will automatically track your progress as you configure the network.