11.3-4_Mitigate DHCP Attacks Flashcards
___ does not rely on source MAC addresses, instead it determines whether DHCP messages are from an administratively configured trusted or untrusted source. It then filters DHCP messages and rate-limits DHCP traffic from untrusted sources.
DHCP snooping
Trusted interfaces are typically ___ and ports directly connected to a legitimate DHCP server.
trunk links
Steps to Implement DHCP Snooping
Enable DHCP snooping by using the ip dhcp snooping global configuration command.
Step 1.
Steps to Implement DHCP Snooping
On trusted ports, use the ip dhcp snooping trust interface configuration command.
Step 2
Steps to Implement DHCP Snooping
Limit the number of DHCP discovery messages that can be received per second on untrusted ports by using the ip dhcp snooping limit rate interface configuration command.
Step 3
Steps to Implement DHCP Snooping
Enable DHCP snooping by VLAN, or by a range of VLANs, by using the ip dhcp snooping vlan global configuration command.
Step 4
Use the___ privileged EXEC command to verify DHCP snooping
show ip dhcp snooping
use ___ to view the clients that have received DHCP information
show ip dhcp snooping binding
The ___global configuration command is used to configure DAI to drop ARP packets when the IP addresses are invalid.
ip arp inspection validate {[src-mac] [dst-mac] [ip]}
TRUE OR FALSE
It is alright to enter multiple ip arp inspection validate commands
FALSE
entering multiple ip arp inspection validate commands overwrites the previous command. To include more than one validation method, enter them on the same command line as shown and verified in the following output.