Chapter Intro
Chapter 8 of the CCNA 200-301 Official Cert Guide, Volume 2 discussed two topics related by their overall goals and because of their mechanisms. Both features help secure a network by protecting common protocols against attacks meant to take advantage of those protocols. They are:
- DHCP Snooping
- Dynamic ARP Inspection
Normally, a switch would forward DHCP messages sent by the attached devices, ignoring the fact that some Ethernet frame happened to encapsulate a DHCP message. DHCP Snooping causes the switch to examine the DHCP details, collect data, and make choices. Those choices include filtering DHCP messages that appear to be part of a DHCP-based attack.
A switch configured to use DAI follows a similar process with ARP messages sent by attached devices. The switch would normally forward those Ethernet frames that happened to encapsulate an ARP message, ignoring the ARP details. DAI causes the switch to examine the detail of ARP messages that it forwards. DAI uses a table that lists the legitimate IP address/MAC address pairs, filtering ARP messages that do not conform to that list. DAI uses two types of lists: one statically configured with an ARP ACL, and the other dynamically learned with the DHCP Snooping feature. So it makes sense to learn about DAI and DHCP Snooping at the same time.
Hi Wendell,
I have a question abou DHCP Snooping configuration.
First my question is if you can use SVIs, with dynamic ip allocation, on a switch with DHCP Snooping active (I presume you should in order to manage the sw)?
This is my DHCP lab (with Server, Relay and Clients) where I face an issue:
1 – I set dhcp snooping on a switch that sits on the access side; the sw connects DhcpClients on two Vlans;
2 – the switch has two SVI’s (for each VLAN) and ip addresses through DHCP.
3 – the switch has also a trunk interface towards a router (ROAS topology basically)
4 – on the router are two sub-interfaces with static ip AND for each vlan with #ip helper-address.
5 – ..becaus the router has on another interface/subnet a DHCP server.
Everithing works fine beside the SVI; they dont get any IP addr from the DHCP server if the IP DHCP Snooping is on.
The DHCP Clients are ok with any snooping configuration but again the SVI’s on the switch do not get any IP addr assigned if Snooping is on.
I thank you in advance for your time.
Hi Sorino,
Wow, making me think!
I’m going to have to mull on this one. Some ideas and questions for you:
The access switch is not routing between VLANs. So, it needs only one SVI interface, and need to only be a layer 2 switch. As an experiment, turn off IP routing on that switch, use one SVI, see if that helps.
Also… what models/IOS versions on the devices?
Finally, doing this out of curiosity? I would normally statically assign switch IP addresses, for instance. But I get the need to explore and test.
More later as I get inspiration.
Wendell
Wendell,
thanks for your reply.
Is always full of information.
First thing is that I don’t know for what reason I am creating SVIs for each VLAN?!?
So as I understand I should configure only one SVI for the native vlan, for each Access Switch, that I can use for management. Is that correct?
And I have tried with turning off IP Routing and use only one VLAN but no luck.
I have also tried to create another vlan (vlan 30) and I have not add it to DHCP snooping; than remove all the SVIs and create only one in Vlan 30, set the ip address as DHCP and still no DHCP assignament.
For this lab I’m using CML 2.1 with switch vios-12 Version 15.2.
I will dig more cause I would like to know if DHCP Snooping has any effect on a SW with SVI’s with DHCP enabled.
I will try this DHCP lab on real hardware with C2960 for Access, C3560 for Distribution and two 1921 routers to have a gap between the LAN and DHCP Server.
Thanks again,
Sorin