" When dhcp snooping is enabled, switch ports are categorised as trusted or untrusted. Legitimate dhcp servers can be found on trusted ports,whereas all other hosts sit behind untrusted ports.
A switch intercepts all dhcp requests coming from untrusted ports before flooding them throughout the vlan. Any dhcp replies coming from untrusted port are discarded because they must come from a rogue dhcp server."
My questions are:
why does switch have to intercept all dhcp requests coming from untrusted ports because only hosts sitting behind the untrusted ports send dhcp request, let say even we have one rogue dhcp behind untrusted port but it cannot send dhcp requests so what is the reason to intercept all dhcp request?
let say we have two dhcp server s1 and s2 and host on same same subnet. s2 is rogue dhcp server.
s1 is connected by f0/1 to switch ( trusted port)
s2 is connectedto f0/2 to switch ( untrusted port)
host is connected by f0/3 to switch.(untrusted port)
host sends dhcp request at broadcast address, will switch forward this broadcast on trusted port(f0/2) connected to rogue dhcp server s2?
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...