Cisco Systems 6500 Switch User Manual


  Open as PDF
of 1600
 
2-550
Catalyst 6500 Series Switch Command Reference—Release 8.6
OL-8977-01
Chapter 2 Catalyst 6500 Series Switch and ROM Monitor Commands
set port dhcp-snooping
Note the following when configuring DHCP-related features:
IP Source Guard is supported only on the PFC3.
ARP inspection is supported on Supervisor Engine 2, Supervisor Engine 720, and Supervisor Engine
32, but not on Supervisor Engine 1.
DHCP snooping is supported on all supervisor engines.
IP Source Guard is supported on Supervisor Engine 720 and Supervisor Engine 32, but not on
Supervisor Engine 1 or Supervisor Engine 2.
Dynamic ARP Inspection is support on Supervisor Engine 2, Supervisor Engine 720, and Supervisor
Engine 32, but not on Supervisor Engine 1.
You must configure DHCP snooping on a server port when configured on per-port basis. The server
port must be trusted.
You can enable IP Source Guard only when the ACL mode is port based.
Examples This example shows how to enable DHCP trust on port 2 of module 2:
Console> (enable) set port dhcp-snooping 2/2 trust enable
Port(s) 2/2 state set to trusted for DHCP Snooping.
Console> (enable)
This example shows how to enable IP Source Guard on port 2 of module 2:
Console> (enable) set port dhcp-snooping 2/2 source-guard enable
Enabling IP Source Guard on port(s) 2/2.
Console> (enable)
This example shows how to limit the number of bindings to 48 on port 4 and port 5 of module 3:
Console> (enable) set port dhcp-snooping 3/4-5 binding-limit 48
Ports 3/4-5 DHCP snooping binding limit is set to 48
Console> (enable)
This example show how to add a binding to a specified port:
Console> (enable) set port dhcp-snooping 5/1 add-binding 172.20.52.18 00-50-f0-ac-30-54 1
DHCP Snooping Binding addition successful for Port 5/1, Vlan 1
IP addr 172.20.52.18, Mac Addr 00-50-f0-ac-30-54.
Console> (enable)
Related Commands clear dhcp-snooping bindings
show port dhcp-snooping