Navigation
Supported Platforms
Related Documentation
- EX, QFX Series
- Understanding DHCP Snooping for Port Security
- Example: Configuring Basic Port Security Features
- Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from Rogue DHCP Server Attacks
- Enabling a Trusted DHCP Server (CLI Procedure)
- EX Series
- Enabling a Trusted DHCP Server (J-Web Procedure)
Understanding Trusted DHCP Servers for Port Security
Any interface on the switch that connects to a DHCP server can be configured as a trusted port. Configuring a DHCP server on a trusted port protects against rogue DHCP servers sending leases.
Ensure that the DHCP server interface is physically secure—that is, that access to the server is monitored and controlled at the site—before you configure the port as trusted.
Related Documentation
- EX, QFX Series
- Understanding DHCP Snooping for Port Security
- Example: Configuring Basic Port Security Features
- Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from Rogue DHCP Server Attacks
- Enabling a Trusted DHCP Server (CLI Procedure)
- EX Series
- Enabling a Trusted DHCP Server (J-Web Procedure)
Published: 2013-01-17
Supported Platforms
Related Documentation
- EX, QFX Series
- Understanding DHCP Snooping for Port Security
- Example: Configuring Basic Port Security Features
- Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from Rogue DHCP Server Attacks
- Enabling a Trusted DHCP Server (CLI Procedure)
- EX Series
- Enabling a Trusted DHCP Server (J-Web Procedure)