DHCP Snooping 1
Topology

Tasks:
IP connectivity is established. The DHCP server is fully configured and inaccessible. Configure DHCP snooping on SW1 as follows:
- Enable DHCP Snooping on VLAN 10.
- Enable MAC-Address verification for DHCP snooping.
- Disable data insertion to prevent DHCP relay agent information from being added.
- Configure the trusted interface.
- Verify the configuration by allowing PC1 to receive IP address from the DHCP server.
Solution:
Task 1: Enable DHCP Snooping on VLAN
10.
SW1#configure terminal
SW1(config)#ip dhcp snooping
SW1(config)#ip dhcp snooping vlan 10
ip dhcp snooping: Activates DHCP Snooping globally on the switch.
ip dhcp snooping vlan 10:
Enables DHCP Snooping specifically for VLAN 10.
Task 2: Enable MAC-Address
verification for DHCP snooping.
SW1(config)#ip dhcp snooping verify
mac-address
This ensures that the source MAC
address in DHCP packets matches the client’s MAC address recorded in the
binding table.
Task 3: Disable data insertion to
prevent DHCP relay agent information from being added.
DHCP option-82 adds additional
information to the DHCP request packets before forwarding them to the DHCP
server.
SW1(config)#no ip dhcp snooping
information option
This prevents the insertion of DHCP
Option-82 relay agent information in DHCP packets to enhance security.
Task 4: Configure the trusted
interface.
A trusted interface in DHCP snooping
is the uplink interface which is connected to or leads to the known DHCP
server. By marking the interface as trusted, DHCP responses will be allowed
through this port.
SW1(config)#interface
GigabitEthernet0/1
SW1(config-if)#ip
dhcp snooping trust
SW1(config-if)#end
Task 5: Verify the configuration by
allowing PC1 to obtain a valid IP address from the DHCP server.
PC1 should have a link-local address
configured by default. We need to renew the IP configuration.
PC1:\>ipconfig
/renew
IP
Address.................: 192.168.1.2
Subnet
Mask................: 255.255.255.0
Default
Gateway............: 192.168.1.1
DNS
Server.................: 192.168.1.1
Now exit configuration mode and save
the configuration.
SW1(config)#end
SW1#write memory
Packet Tracer File
Clicking this button will begin the download of a ZIP file. Inside the ZIP file, you'll find a Packet Tracer Activity (.pka) file, which will automatically track your progress as you configure the network.