Displays the DHCP snooping configurations on the switch.
vlan_name | Specifies the name of the DHCP-snooping VLAN. |
vlan_name | Specifies the name of the DHCP-snooping VLAN list. |
N/A.
Host name, vendor class identifier and parameter request list have been added to the snooping information as a part of DHCP Fingerprinting, which is a technique used to identify the type of device that sent a DHCP request. DHCP Fingerprinting enhances network security when used with DHCP Snooping. DHCP Fingerprinting can be used to determine a device‘s type, model, operating system, and configuration, which can then be use to identify unauthorized devices on the network.
The following sample output displays the DHCP snooping settings for the switch:
# show ip-security dhcp-snooping vlan "Default" DHCP Snooping enabled on ports: 7, 9, 11 Trusted Ports: None Trusted DHCP Servers: None Bindings Restoration : Enabled Bindings Filename : dhcpsonia.xsf Bindings File Location : Primary Server : 10.1.1.14, VR-Default, TFTP Secondary Server: None Bindings Write Interval : 5 minutes Bindings last uploaded at: ------------------------------------ Port Violation-action ------------------------------------ 7 none 9 none 11 none
The following sample output displays the DHCP snooping settings for the switch if configured through RADIUS:
# show ip-security dhcp-snooping "Default" DHCP Snooping enabled via RADIUS DHCP Snooping enabled on ports: 1, 2, 30 Trusted Ports: None Trusted DHCP Servers: 1.1.1.1, 1.1.2.1 Bindings Restoration : Disabled Bindings Filename : Bindings File Location : Primary Server : None Secondary Server: None Bindings Write Interval : 30 minutes ------------------------------------ Port Violation-action ------------------------------------ 1 drop-packet 2 drop-packet 30 drop-packet
This command was first available in ExtremeXOS 11.6.
The vlan_list variable was added in ExtremeXOS 16.1.
DHCP Fingerprinting was added in ExtremeXOS 32.7.1.
This command is available on all Universal switches supported in this document.