
MAC-Forced Forwarding 5
Using the DHCP Snooping Database
MAC-Forced Forwarding gathers the AR, AS and client details from the DHCP
snooping database. DHCP snooping adds entries to this database when:
■ a client uses DHCP to obtain an IP address - DHCP snooping checks the
DHCP ACK packets sent between the client and its DHCP server
■ you configure the entry manually through a DHCP snooping binding entry
To enable DHCP snooping on the EAN, use the command:
enable dhcpsnooping
You must configure any uplink ports to ARs as trusted ports before DHCP
snooping can successfully operate. To add a trusted port, use the command:
set dhcpsnooping port={port-list|all} trusted=yes
[other-options]
DHCP snooping plays an integral role in MAC-Forced Forwarding operation.
For details about configuring DHCP snooping, see the DHCP Snooping chapter
in your Software Reference.
Manually adding
entries
You can create static entries for clients, ARs and ASs. This allows you to use
MAC-Forced Forwarding for clients on the subnet that do not use DHCP for IP
address assignment. This also allows you to define any ASs available on the
network, as DHCP snooping does not create dynamic entries for ASs.
To add a static client entry, use the command:
add dhcpsnooping binding[=macaddr] interface=vlan ip=ipadd
port=port-number router=[ipadd,ipadd...]
To add a static AR or AS entry, use the command:
add macff server interface=vlan ipaddress={ipadd}
[description=desc]
Viewing the entries To view the list of clients in the DHCP snooping database, use the command:
show dhcpsnooping database
To display the list of ARs and ASs in the database, use the command:
show macff database
Enabling MAC-Forced Forwarding
To enable the EAN to proxy ARP on behalf of ARs and ASs on a VLAN, use the
command:
enable macff interface=vlan
To disable MAC-Forced Forwarding on a VLAN, use the command:
disable macff interface=vlan
Kommentare zu diesen Handbüchern