First page Back Continue Last page Image
Using DHCP Snooping to Secure DHCP Services
Which Ports are Trusted?
- Devices under administrative control (e.g., switches, routers, and servers) are trusted sources
-
- Trusted interfaces (e.g., trunk links, server ports) must be explicitly configured as trusted
- Devices outside the network and all access ports are generally treated as untrusted sources
DHCP snooping filters DHCP messages and rate-limits DHCP traffic on untrusted ports