2-550
Catalyst 6500 Series Switch Command Reference—Release 8.6
OL-8977-01
Chapter 2 Catalyst 6500 Series Switch and ROM Monitor Commands
set port dhcp-snooping
Note the following when configuring DHCP-related features:
• IP Source Guard is supported only on the PFC3.
• ARP inspection is supported on Supervisor Engine 2, Supervisor Engine 720, and Supervisor Engine
32, but not on Supervisor Engine 1.
• DHCP snooping is supported on all supervisor engines.
• IP Source Guard is supported on Supervisor Engine 720 and Supervisor Engine 32, but not on
Supervisor Engine 1 or Supervisor Engine 2.
• Dynamic ARP Inspection is support on Supervisor Engine 2, Supervisor Engine 720, and Supervisor
Engine 32, but not on Supervisor Engine 1.
• You must configure DHCP snooping on a server port when configured on per-port basis. The server
port must be trusted.
• You can enable IP Source Guard only when the ACL mode is port based.
Examples This example shows how to enable DHCP trust on port 2 of module 2:
Console> (enable) set port dhcp-snooping 2/2 trust enable
Port(s) 2/2 state set to trusted for DHCP Snooping.
Console> (enable)
This example shows how to enable IP Source Guard on port 2 of module 2:
Console> (enable) set port dhcp-snooping 2/2 source-guard enable
Enabling IP Source Guard on port(s) 2/2.
Console> (enable)
This example shows how to limit the number of bindings to 48 on port 4 and port 5 of module 3:
Console> (enable) set port dhcp-snooping 3/4-5 binding-limit 48
Ports 3/4-5 DHCP snooping binding limit is set to 48
Console> (enable)
This example show how to add a binding to a specified port:
Console> (enable) set port dhcp-snooping 5/1 add-binding 172.20.52.18 00-50-f0-ac-30-54 1
DHCP Snooping Binding addition successful for Port 5/1, Vlan 1
IP addr 172.20.52.18, Mac Addr 00-50-f0-ac-30-54.
Console> (enable)
Related Commands clear dhcp-snooping bindings
show port dhcp-snooping