Users Guide

Table Of Contents
Before creating a static entry for a VLAN, create the VLAN. If you do not create a VLAN before creating
a static entry, the system displays an error message.
Before deleting a port-channel or VLAN, remove any associated DHCP snooping entries.
This command is accessible to users with sysadmin and secadmin roles.
The no version of this command deletes the static entry from the DHCP snooping binding table.
Example
OS10(config)# ip dhcp snooping binding mac 00:04:96:70:8a:12 vlan 100 ip
100.1.1.2 interface ethernet 1/1/4
Supported
Releases
10.5.0 or later
ip dhcp snooping trust
Configures an interface as trusted in a DHCP snooping enabled VLAN.
Syntax
ip dhcp snooping trust
Parameters None
Defaults Untrusted
Command Mode INTERFACE
Usage
Information
This command configures a physical or port channel interface as trusted. By default all physical and
port channel interfaces in the DHCP snooping enabled VLAN are untrusted. You can configure a DHCP
server-facing physical or port channel interface as trusted. The system permits DHCP server packets
only if they ingress through a trusted interface. If the system receives DHCP packets on an untrusted
interface, it interprets the device that is connected to the untrusted interface as rogue DHCP server and
drops the packet.
The no version of this command resets the interface to untrusted.
Example
OS10(conf-if-eth1/1/33)# ip dhcp snooping trust
Supported
Releases
10.5.0 or later
ip dhcp snooping verify mac-address
Enables DHCPv4 source MAC address validation
Syntax
ip dhcp snooping verify mac-address
Parameters
None
Defaults Disabled
Command Mode CONFIGURATION
Usage
Information
This command enables DHCPv4 source MAC address validation to validate the source hardware address
of a DHCP packet against the client hardware address field (CHADDR) in the DHCP payload.
Example
OS10(config)# ip dhcp snooping verify mac-address
Supported
Releases
10.5.0 or later
System management 239