Users Guide

Table Of Contents
Before creating a static entry for a VLAN, create the VLAN. If you do not create a VLAN before creating a static
entry, the system displays an error message.
Before deleting a port-channel or VLAN, remove any associated DHCP snooping entries.
This command is accessible to users with sysadmin and secadmin roles.
The no version of this command deletes the static entry from the DHCP snooping binding table.
Example
OS10(config)# ip dhcp snooping binding mac 00:04:96:70:8a:12 vlan 100 ip
100.1.1.2 interface ethernet 1/1/4
Supported Releases 10.5.0.0 or later
ip dhcp snooping trust
Congures an interface as trusted in a DHCP snooping enabled VLAN.
Syntax
ip dhcp snooping trust
Parameters None
Defaults Untrusted
Command Mode INTERFACE
Usage Information
This command congures a physical or port channel interface as trusted. By default all physical and port channel
interfaces in the DHCP snooping enabled VLAN are untrusted. You can congure a DHCP server-facing physical or
port channel interface as trusted. The system permits DHCP server packets only if they ingress through a trusted
interface. If the system received DHCP packets on an untrusted interface, it interprets the device that is
connected to the untrusted DHCP server and drops the packet.
The no version of this command resets the interface to untrusted.
Example
OS10(conf-if-eth1/1/33)# ip dhcp snooping trust
Supported Releases 10.5.0.0 or later
ip dhcp snooping verify mac-address
Enables DHCPv4 source MAC address validation
Syntax
ip dhcp snooping verify mac-address
Parameters
None
Defaults Disabled
Command Mode CONFIGURATION
Usage Information
This command enables DHCPv4 source MAC address validation to validate the source hardware address of a
DHCP packet against the client hardware address eld (CHADDR) in the DHCP payload.
Example
OS10(config)# ip dhcp snooping verify mac-address
196 System management