user manual
Table Of Contents
- Contents
- List of Figures
- List of Tables
- Preface
- Section I
- Getting Started
- Chapter 1
- Chapter 2
- System Configuration
- System Management Information
- Configuration of IP Address, Subnet Mask and Gateway Address
- IP Access List Configuration
- User Name and Password Configuration
- User Interface Configuration
- System Time
- SSL Settings
- DHCP and ATI Web Discovery Tool
- DHCP Client Configuration
- DHCP Auto Configuration
- System Information Display
- System Log Configuration
- System Configuration
- Section II
- Section III
- Advanced Features
- Chapter 16
- Chapter 17
- Chapter 18
- Chapter 19
- Chapter 20
- Chapter 21
- Chapter 22
- Chapter 23
- Chapter 24
- Chapter 25
- Section IV
- Appendix A
- Appendix B

Chapter 23: DHCP Snooping
292
General Guidelines
Here is a summary of the rules to observe when you configure DHCP
Snooping:
A trusted port is connected to one of the following:
– Directly to the legitimate trusted DHCP Server.
– A network device relaying DHCP messages to
and from a trusted server.
– Another trusted source such as a switch with
DHCP Snooping enabled.
Untrusted ports are connected to DHCP clients and to
traffic that originates outside of the local area network.
The VLANs to which the DHCP Snooping feature
applies must be specified in the DHCP Snooping
VLAN Setting configuration.
Any static IP addresses on the network must be
manually added to the Binding Database.