Navigation
Supported Platforms
Related Documentation
- EX Series, QFX Series standalone switches
- Understanding DHCP Snooping for Port Security
- EX Series, QFabric System, QFX Series standalone switches
- Example: Configuring Basic Port Security Features
- Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from Rogue DHCP Server Attacks
- Enabling a Trusted DHCP Server (CLI Procedure)
- EX Series
- Example: Configuring IP Source Guard and Dynamic ARP Inspection to Protect the Switch from IP Spoofing and ARP Spoofing
- Enabling a Trusted DHCP Server (CLI Procedure)
- Enabling a Trusted DHCP Server (J-Web Procedure)
Understanding Trusted DHCP Servers for Port Security
Any interface on the switch that connects to a DHCP server can be configured as a trusted port. Configuring a DHCP server on a trusted port protects against rogue DHCP servers sending leases.
Ensure that the DHCP server interface is physically secure—that is, that access to the server is monitored and controlled at the site—before you configure the port as trusted.
Related Documentation
- EX Series, QFX Series standalone switches
- Understanding DHCP Snooping for Port Security
- EX Series, QFabric System, QFX Series standalone switches
- Example: Configuring Basic Port Security Features
- Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from Rogue DHCP Server Attacks
- Enabling a Trusted DHCP Server (CLI Procedure)
- EX Series
- Example: Configuring IP Source Guard and Dynamic ARP Inspection to Protect the Switch from IP Spoofing and ARP Spoofing
- Enabling a Trusted DHCP Server (CLI Procedure)
- Enabling a Trusted DHCP Server (J-Web Procedure)
Published: 2014-07-23
Supported Platforms
Related Documentation
- EX Series, QFX Series standalone switches
- Understanding DHCP Snooping for Port Security
- EX Series, QFabric System, QFX Series standalone switches
- Example: Configuring Basic Port Security Features
- Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from Rogue DHCP Server Attacks
- Enabling a Trusted DHCP Server (CLI Procedure)
- EX Series
- Example: Configuring IP Source Guard and Dynamic ARP Inspection to Protect the Switch from IP Spoofing and ARP Spoofing
- Enabling a Trusted DHCP Server (CLI Procedure)
- Enabling a Trusted DHCP Server (J-Web Procedure)