I have DHCP Snooping running on my switches. I got a few interesting things in the logs and just need someone to help me decipher what is going on.
1. Feb 23 13:52:46.273 EST: %DHCP_SNOOPING-5-DHCP_SNOOPING_UNTRUSTED_PORT: DHCP_SNOOPING drop message on untrusted port, message type: DHCPOFFER, MAC sa: 0014.60f4.8184
2. Feb 24 03:09:30.923 EST: %DHCP_SNOOPING-4-AGENT_OPERATION_FAILED: DHCP snooping binding transfer failed. Unable to access URL.
3. Feb 24 09:03:06.394 EST: %DHCP_SNOOPING-5-DHCP_SNOOPING_MATCH_MAC_FAIL: DHCP_SNOOPING drop message because the chaddr doesn't match source mac, message type: DHCPRELEASE, chaddr: 4e4d.ab54.bdf1, MAC sa: 0015.587f.effe
%DHCP_SNOOPING-5-DHCP_SNOOPING_UNTRUSTED_PORT (x1): [char] drop message on untrusted port message type: [char] MAC sa: [mac-addr]
Explanation: The DHCP snooping feature discovered certain types of DHCP messages not allowed on the untrusted interface, indicating some host may be trying to act as a DHCP server. The packet will be dropped.
Recommended Action: This is an informational message only. No action is required.
Jan 21 2016 09:17:48 BJT: %DHCP_SNOOPING-5-DHCP_SNOOPING_MATCH_MAC_FAIL: DHCP_SNOOPING drop message because the chaddr doesn't match source mac, message type: DHCPDISCOVER, chaddr: 00c2.c629.7efe, MAC sa: 3c97.0ecd.7c00
I'm a remote connection, now I want to know how to find the interface the untrust DHCP server connected , then to shutdown the interface。
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...