Navigation
Table of Contents
Guide That Contains This Content
[+] Expand All
[-] Collapse All
Related Documentation
- EX Series
- Understanding DHCP Snooping for Port Security
- Example: Configuring Basic Port Security Features
- Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from Rogue DHCP Server Attacks
- Enabling a Trusted DHCP Server (CLI Procedure)
- Enabling a Trusted DHCP Server (J-Web Procedure)
- QFX Series
- Understanding DHCP Snooping for Port Security
- Example: Configuring Basic Port Security Features
- Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from Rogue DHCP Server Attacks
- Enabling a Trusted DHCP Server (CLI Procedure)
Understanding Trusted DHCP Servers for Port Security
Any interface on the switch that connects to a DHCP server can be configured as a trusted port. Configuring a DHCP server on a trusted port protects against rogue DHCP servers sending leases.
Ensure that the DHCP server interface is physically secure—that is, that access to the server is monitored and controlled at the site—before you configure the port as trusted.
Related Documentation
- EX Series
- Understanding DHCP Snooping for Port Security
- Example: Configuring Basic Port Security Features
- Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from Rogue DHCP Server Attacks
- Enabling a Trusted DHCP Server (CLI Procedure)
- Enabling a Trusted DHCP Server (J-Web Procedure)
- QFX Series
- Understanding DHCP Snooping for Port Security
- Example: Configuring Basic Port Security Features
- Example: Configuring a DHCP Server Interface as Untrusted to Protect the Switch from Rogue DHCP Server Attacks
- Enabling a Trusted DHCP Server (CLI Procedure)

