dhcp-filter-create
DHCP snooping is a security feature which allows the network to avoid denial-of-service attacks from rogue DHCP servers. Trusted ports are defined to connect to the known DHCP servers. DHCP snooping also maintains a mapping table for current assignments.
In a DHCP packet flow, there are the following packet types:
- DHCPDISCOVER/DHCPREQUEST — Packets from the DHCP client to server (UDP dest-port = 67)
 - DHCPOFFER/DHCPACK — Packets from the DHCP Server to client (UDP dest-port = 68)
 
NetVisor must snoop the DHCP packets in order to implement this feature, and achieves this by installing a copy-to-cpu vFlow with the parameter, bw-max, to set packet rate limits.
- DHCP-client-vflow — Packets with UDP dest-port=67, copy-to-cpu
 - DHCP-server-vflow — Packets with UDP dest-port=68, copy-to-cpu
 
A trusted port is a port receiving the DHCP server messages from a trusted DHCP server. Any DHCP server message, such as OFFER/ACKNOWLEDGE, received from trusted ports are valid. Ports not configured as trusted are untrusted ports. NetVisor drops any DHCP server message received from untrusted ports, and ensures that a rogue DHCP server cannot assign IP addresses to devices on your network.
This command is used to create a DHCP filter.
Syntax dhcp—filter-create
| 
    name name-string  | 
  
    Specify a name for the filter.  | 
 
| 
    trusted-ports port-list  | 
  
    Specify a list of trusted ports.  | 
 
Defaults None
Access Network Administrator
History
| 
    Version 2.6.0  | 
  
    Command introduced.  | 
 
Usage Use this command to create a DHCP filter for trusted ports.
Examples To create a DHCP filter, trust-server-1, and port 13-17 , use the following syntax:
CLI (network-admin@switch) > dhcp-filter-create name trust-server-1 ports 13-17
