DHCP snooping acts like a firewall between untrusted hosts and trusted DHCP servers. DHCP snooping performs the following activities:
• Validates DHCP messages received from untrusted sources and filters out invalid messages.
• Builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses.
• Uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts.
DHCP snooping is enabled on a per-VLAN basis. By default, the feature is inactive on all VLANs. You can enable the feature on a single VLAN or a range of VLANs.
Note: For DHCP snooping to function properly, all DHCP servers must be connected to the device through trusted interfaces.
Dynamic ARP inspection (DAI) and IP Source Guard also use information stored in the DHCP snooping binding database.
Configuration example:
conf t ip dhcp snooping vlan 661 ip dhcp snooping database flash:/dhcp-snooping.db ip dhcp snooping interface FastEthernet0/1 switchport access vlan 10 switchport mode access ip dhcp snooping trust end wr mem
To verify DHCP Snooping use following commands:
show ip dhcp snooping show ip dhcp snooping binding
You can remove entries from the binding database by using:
clear ip dhcp snooping binding
More information about DHCP snooping configuration can be found here: