Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

dhcp interface

An interface has following

interface FastEthernet2/0/24
switchport access vlan 100
switchport mode access
  ip arp inspection trust
no logging event link-status
storm-control action shutdown
spanning-tree portfast
spanning-tree guard root
ip dhcp snooping limit rate 56

vlan 100 is divided into 2 parts- half into dhcp and other half into static ip's.dhcp is till 192.168.100.62 & static range from .63 onwards till .254.

a user using 192.168.100.120 ip plugs in , but is unable to use the network. his arp doesnt appear & is incomplete on the switch.

kindly advise possible way out.

Thank You All.

1 ACCEPTED SOLUTION

Accepted Solutions

Re: dhcp interface

You should only need DHCP snooping trust on the port of your DHCP

server but if you have arp inspection enabled you will need 'ip arp

inspection trust' on every port where a host with a static ip

connects. The reason is that arp inspection will filter any arps for

addresses not handed out by DHCP.

4 REPLIES
VIP Super Bronze

Re: dhcp interface

What if you delete  "ip arp inspection trust" and clear the arp-cash and test again?

New Member

Re: dhcp interface

Thanks, i will have these tried & see the status. am i also missing ip dhcp snooping trust?

Re: dhcp interface

You should only need DHCP snooping trust on the port of your DHCP

server but if you have arp inspection enabled you will need 'ip arp

inspection trust' on every port where a host with a static ip

connects. The reason is that arp inspection will filter any arps for

addresses not handed out by DHCP.

New Member

Re: dhcp interface

So , should i only go with ip dhcp snooping trust on the interface and take out rest of them ( inspection, snooping limit ).

Thank You.


196
Views
3
Helpful
4
Replies