Network Management

 View Only
  • 1.  DHCP Snooping drops the correct Server?

    Posted Aug 08, 2025 09:14 AM

    Hello,

    since we recently had a problem with one of the colleguaes bringing their own fritzbox for "i needed better wifi", we wanted to roll out DHCP Snooping across our Switches.

    we have a few older switches that dont support DHCP Snooping, but most of them do and down below are the lines i configured for all of them:


    10.105.0.1 is that location's Domain Controller, DHCP, NTP Server and a few other things, our gateway is done by the firewall and sits on the 10.105.0.254, connected to the same Switch.

    the VLANs on the location range from 80-110, but 105-109 are the only ones with an  active DHCP and 106-109 the only ones important for clients. 105 is the Management VLAN that the Server and all our Switches are in, has a DHCP set up for the IPs of the Access points, Switches are static. we do not use Option 82 anywhere.

    Our core is a flexfabric and thus was a bit differently configutred, not via authoriszed DHCP server IP, but with "trusted" Ports. since the Server isnt on the FF directly but one of the nearby switches, I set those switch uplinks as "trusted" ports.

    from what i read, this should've been a simple config change that simply blocks out everything that ISNT the 10.105.0.1, but a few hour later, our first-level Support colleagues get multiple calls of their internet not working anymore, and all of those we checked getting an APIPA Address.

    any idea where i went wrong with three lines of config?



    -------------------------------------------


  • 2.  RE: DHCP Snooping drops the correct Server?

    Posted Aug 08, 2025 09:41 AM

    You need to configure the uplinks as DHCP-snooping trust. 

    Some the authorized server config give issues. I've seen that in the past with Comware. That authorized server config is optional.

    Please use the command "show dhcp-snooping stats" to figure out if DHCP snooping is dropping packets.



    ------------------------------
    Willem Bargeman
    Systems Engineer Aruba
    ACEX #125
    ------------------------------



  • 3.  RE: DHCP Snooping drops the correct Server?

    Posted Aug 08, 2025 09:47 AM


    so i should prefer trusted port settings over authorized server Settings?

    -------------------------------------------



  • 4.  RE: DHCP Snooping drops the correct Server?
    Best Answer

    Posted Aug 08, 2025 09:53 AM

    You MUST configure the trusted port. Like you can see the DHCP packets are dropped because an untrusted port.



    ------------------------------
    Willem Bargeman
    Systems Engineer Aruba
    ACEX #125
    ------------------------------



  • 5.  RE: DHCP Snooping drops the correct Server?

    Posted Aug 09, 2025 07:17 AM

    If I am not mistaken, you need BOTH trusted ports AND authorized server (rather than it being the case of preferring one over another). Trusted ports tell the system which ports DHCP responses are allowed to come into the switch from, and authorized server tells the switch which IP addresses are allowed to give those DHCP responses. I reckon that the two together make it much harder for someone to deliberately spoof your DHCP server than just one or the other would.

    -------------------------------------------



  • 6.  RE: DHCP Snooping drops the correct Server?

    Posted Aug 09, 2025 10:37 AM
    Uplink trust is required. Authorised server is optional. From security point of view it has benefits but it is optional.

    ---------------------------------
    Willem Bargeman
    Systems Engineer Aruba
    ACEX #125
    ---------------------------------





  • 7.  RE: DHCP Snooping drops the correct Server?

    Posted Aug 12, 2025 09:20 AM

    Thanks for your help, I have a Follow-up Question:

    This is the output of the Switch that is directly connected to the DHCP-Server, and the Interface the DHCP is on has been set as trusted.

    But now i get "client drop, destination on untrusted port" and i got drops for Option 82 and one in verify MAC check, which neither of those two have ever been set up on the switch. but making every port "trusted" because it leads to a client sounds like it defeats the entire purpose of trusted ports.

    and for the switches that worked well with the new settings,

    how can there be such a big difference between server > succesfully forwarded > client? i'd somewhere understand it if the DHCP packet just goes through the switch to a different switch, for the Server forward to be higher, but how can the client forward be that much higher?

    -------------------------------------------