Wireless Network Manager Administration Guide
- Wireless Network Manager
- Getting Started with Wireless Network Manager
- Overview
- Using Air Marshal
- Managing Your Network
- Managing Policies
- Policy Hierarchy
- Select an AP Policy
- Select a Switch Policy
- General
- System
- Spanning Tree Protocol
- Link Layer Discovery Protocol
- Voice VLAN
- Quality of Service (QoS)
- Internet Group Management Protocol (IGMP) Snooping
- Dynamic Host Configuration Protocol (DHCP) Snooping
- Dynamic Host Configuration Protocol (DHCP) Relay
- Loopback Detection
- Jumbo Frames
- Multicast Filtering
- 802.1X
- Static Route IPV4
- DoS
- Radius Server
- Mirror Settings
- Address Resolution Protocol
- Static MAC Address Table
- SNMP
- Ports
- Port Policy
- Link Aggregation
- VLAN
- Select an SSID
- Select a Security Policy
- AP Policies
- Using Tags to Manage Access Points and SSIDs
- QoS Policies
- Wi-Fi Multimeda (WMM) Profiles
- Managing Switch Policies
- Managing Switch Port Policies
- Security Policies
- Managing SNMP Policies
- Managing Switch SNMP Policies
- Policy Hierarchy
- Objects
- Admin
- SonicWall Support
Dynamic Host Configuration Protocol (DHCP) Snooping
DHCP snooping is a layer 2 security technology built into the operating system of a capable network switch that drops DHCP traffic determined to be unacceptable. The fundamental use case for DHCP snooping is to prevent unauthorized (rogue) DHCP servers offering IP addresses to DHCP clients.
Dynamic Host Configuration Protocol (DHCP) assigns dynamic IP addresses to devices on a network. DHCP ensures that network devices have a different IP address every time the device connects to the network.
To activate the DHCP Snooping
- Navigate to Policies > Policy Hierarchy > Switch Policy.
- Select the System tab and scroll down to the IGMP Snooping section.
- Enable the toggle bar, DHCP Snooping Enable.
- Enable the toggle bar Mac Verify. If the device receives a packet on an untrusted interface and the source MAC address and the DHCP client hardware address do not match, address verification causes the device to drop the packet, if you enable this option.
Was This Article Helpful?
Help us to improve our support portal