SV-110343r1_rule
V-101239
SRG-NET-000362-L2S-000025
CISC-L2-000130
CAT II
10
Step 1: Enable the DHCP feature.
SW1(config)# feature dhcp
Step 2: Configure the switch to have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources as shown in the example below:
SW1(config)# ip dhcp snooping
SW1(config)# ip dhcp snooping vlan 4,6-10
Step 1: Review the switch configuration and verify that DHCP snooping is enabled on a per-VLAN basis as shown in the example below:
vlan 1,4,6-10
ip dhcp snooping
…
…
…
ip dhcp snooping vlan 4,6-10
Note: Switchports assigned to a user VLAN would have drops in the area where the user community would reside; hence, the "untrusted" term is used. Server and printer VLANs would not be applicable. By default, DHCP snooping is disabled on all VLANs.
If the switch does not have DHCP snooping enabled for all user VLANs to validate DHCP messages from untrusted sources, this is a finding.
V-101239
False
CISC-L2-000130
Step 1: Review the switch configuration and verify that DHCP snooping is enabled on a per-VLAN basis as shown in the example below:
vlan 1,4,6-10
ip dhcp snooping
…
…
…
ip dhcp snooping vlan 4,6-10
Note: Switchports assigned to a user VLAN would have drops in the area where the user community would reside; hence, the "untrusted" term is used. Server and printer VLANs would not be applicable. By default, DHCP snooping is disabled on all VLANs.
If the switch does not have DHCP snooping enabled for all user VLANs to validate DHCP messages from untrusted sources, this is a finding.
M
3551