Cisco me 3400 Guia De Referência

Página de 872
 
2-425
Cisco ME 3400 Ethernet Access Switch Command Reference
OL-9640-07
Chapter 2    Cisco ME 3400 Ethernet Access Switch Cisco IOS Commands
show ip dhcp snooping statistics
 shows the DHCP snooping statistics and their descriptions:
Table 2-14
DHCP Snooping Statistics
DHCP Snooping Statistic
Description
Packets Processed by DHCP Snooping
Total number of packets handled by DHCP snooping, 
including forwarded and dropped packets.
Packets Dropped Because IDB not known
Number of errors when the input interface of the packet 
cannot be determined.
Queue full
Number of errors when an internal queue used to process 
the packets is full. This might happen if DHCP packets 
are received at an excessively high rate and rate limiting 
is not enabled on the ingress ports.
Interface is in errdisabled
Number of times a packet was received on a port that has 
been marked as error disabled. This might happen if 
packets are in the processing queue when a port is put into 
the error-disabled state and those packets are 
subsequently processed.
Rate limit exceeded
Number of times the rate limit configured on the port was 
exceeded and the interface was put into the error-disabled 
state.
Received on untrusted ports
Number of times a DHCP server packet (OFFER, ACK, 
NAK, or LEASEQUERY) was received on an untrusted 
port and was dropped.
Nonzero giaddr
Number of times the relay agent address field (giaddr) in 
the DHCP packet received on an untrusted port was not 
zero, or the no ip dhcp snooping information option 
allow-untrusted
 global configuration command is not 
configured and a packet received on an untrusted port 
contained option-82 data.
Source mac not equal to chaddr
Number of times the client MAC address field of the 
DHCP packet (chaddr) does not match the packet source 
MAC address and the ip dhcp snooping verify 
mac-address
 global configuration command is 
configured.
Binding mismatch
Number of times a RELEASE or DECLINE packet was 
received on a port that is different than the port in the 
binding for that MAC address-VLAN pair. This indicates 
someone might be trying to spoof the real client, or it 
could mean that the client has moved to another port on 
the switch and issued a RELEASE or DECLINE. The 
MAC address is taken from the chaddr field of the DHCP 
packet, not the source MAC address in the Ethernet 
header.
Insertion of opt82 fail
Number of times the option-82 insertion into a packet 
failed. The insertion might fail if the packet with the 
option-82 data exceeds the size of a single physical packet 
on the internet.