3com 2928 Guía Del Usuario
3-5
Configuring DHCP Snooping Functions on an Interface
Select Network > DHCP from the navigation tree, and then click the DHCP Snooping tab to enter the
page shown in
page shown in
. You can view trusted and untrusted ports in the Interface Config field. Click
the
icon of a specific interface to enter the page shown in
.
Figure 3-4
DHCP snooping interface configuration page
describes DHCP snooping interface configuration items.
Table 3-2
DHCP snooping interface configuration items
Item
Description
Interface Name
This field displays the name of a specific interface.
Interface State
Configure the interface as trusted or untrusted.
Option 82 Support
Configure DHCP snooping to support Option 82 or not.
Option 82 Strategy
Select the handling strategy for DHCP requests containing Option 82. The
strategies include:
z
Drop: The message is discarded if it contains Option 82.
z
Keep: The message is forwarded without its Option 82 being changed.
z
Replace: The message is forwarded after its original Option 82 is
replaced with the Option 82 padded in normal format.
Displaying Clients' IP-to-MAC Bindings
Select Network > DHCP from the navigation tree, and then click the DHCP Snooping tab to enter the
page shown in
page shown in
. Click the User Information button to view clients' IP-to-MAC bindings
recorded by DHCP snooping, as shown in
.
Figure 3-5
DHCP snooping user information
describes DHCP snooping user information configuration items.