DHCP Snooping Configuration
In this How To we will cover how to configure DHCP Snooping with the L3 device in our network as the DHCP server. First thing we will have to do is configure the baselines for all devices. SW1, SW2, and SW3 will have VLANs 10,20 created, and all trunks links configured. The Router will have a DHCP pool configured and sub-interfaces.
This How To assumes you already know how to configure these technologies. If you do not know how to configure refer to the other How To's.

Configuration
First we will have to determine the "trusted" and "untrusted" interfaces in the network. "trusted" ports will be the links that are receiving the DHCP server messages. [SW2--Eth0/2], [SW3--Eth0/0], [SW1--Eth0/1]. The "untrusted" ports will be all the ports that receive incoming DHCP client messages. Now let's start are basic configuration.
The full configuration is shown below.

Now let's try to pull a DHCP address. We will show a wireshark capture and a debug message from SW2 that shows the packet being dropped because of the DHCP option 82 being inserted.


Although output is limited essentially what is happening here is the DHCP packet is getting dropped before it even makes it to the DHCP server. Because at the next hop at SW3 that 82 option will make the switch believe it is a relay message, which it is not. It is a DHCP broadcast message. To fix we must a command to both our switches and a command for our router.
with these two commands configured we will now be able to receive an IP address via DHCP.
Below we have our PC completing the DORA process, and then a packet capture of the link between SW3 and the DHCP server. And also our DHCP snooping verification command.



Last updated