Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:03,750 --> 00:00:07,240
This is a free, complete course for the CCNA.
2
00:00:07,240 --> 00:00:11,109
If you like these videos, please subscribe\n
3
00:00:11,109 --> 00:00:15,759
Also, please like and leave a comment, and\n
4
00:00:18,739 --> 00:00:24,448
If you want more labs like this, I highly\n
5
00:00:24,449 --> 00:00:28,880
NetSim is a network simulator like Packet\n
6
00:00:28,879 --> 00:00:33,808
over 100 detailed guided labs covering the\nCCNA exam topics.
7
00:00:33,808 --> 00:00:38,289
If you want to get NetSim, follow the link\nin the description.
8
00:00:38,289 --> 00:00:43,280
In this video we’ll configure DHCP snooping\non SW1 and SW2.
9
00:00:43,280 --> 00:00:47,510
This is the same topology as in the lecture\n
10
00:00:48,560 --> 00:00:55,070
Let’s get right into it by configuring R1\n
11
00:00:56,579 --> 00:01:04,228
CONF T. Let’s exclude 192.168.1.1 to 192.168.1.9\nfrom the pool.
12
00:01:04,228 --> 00:01:09,569
Remember, this part of the configuration is\n
13
00:01:09,569 --> 00:01:17,359
IP DHCP EXCLUDED-ADDRESS 192.168.1.1 192.168.1.9.
14
00:01:17,359 --> 00:01:19,959
Okay, now I’ll configure the pool.
15
00:01:24,980 --> 00:01:31,859
I’ll configure the 192.168.1.0/24 subnet.
16
00:01:31,859 --> 00:01:34,679
NETWORK 192.168.1.0 255.255.255.0.
17
00:01:34,680 --> 00:01:38,320
And then configure R1 as the default gateway.
18
00:01:39,870 --> 00:01:45,960
Okay, that’s all the configuration needed\non R1.
19
00:01:45,959 --> 00:01:50,000
Next let’s configure DHCP snooping on SW1\nand SW2.
20
00:01:54,299 --> 00:01:59,509
CONF T. First, enable DHCP snooping globally.
21
00:02:02,049 --> 00:02:06,000
But, that isn’t enough to actually enable\nDHCP snooping.
22
00:02:06,000 --> 00:02:09,860
We need to tell SW1 which VLANs to enable\nit for.
23
00:02:09,860 --> 00:02:16,100
Only VLAN 1 is being used in this network,\n
24
00:02:18,959 --> 00:02:24,479
However, all interfaces are untrusted, so\n
25
00:02:24,479 --> 00:02:30,439
Let’s configure G0/2, connected to R1, as\na trusted port.
26
00:02:36,000 --> 00:02:39,139
Okay, that’s all for SW1 for now.
27
00:02:39,139 --> 00:02:43,589
There’s one command I left out, but we’ll\ncome back to it later.
28
00:02:43,590 --> 00:02:47,620
Now I’ll do the exact same configurations\non SW2.
29
00:02:56,479 --> 00:03:02,139
G0/1 is the uplink leading toward R1, so INTERFACE\nG0/1.
30
00:03:05,479 --> 00:03:10,049
Okay, now let’s try to get an IP address\non PC1.
31
00:03:10,050 --> 00:03:13,430
To do that I’ll use the command IPCONFIG\n/RENEW.
32
00:03:18,479 --> 00:03:24,189
The correct interfaces are configured as trusted,\n
33
00:03:25,699 --> 00:03:29,879
Well, let’s check by switching to simulation\nmode.
34
00:03:29,879 --> 00:03:31,069
And then do IPCONFIG /RENEW again.
35
00:03:31,069 --> 00:03:40,019
The DHCP message goes to SW2 and then SW1,\n
36
00:03:41,020 --> 00:03:46,709
Let’s check this message here, as it was\nreceived by SW1.
37
00:03:46,709 --> 00:03:53,000
Down at the bottom of the Inbound PDU details,\n
38
00:03:54,620 --> 00:03:57,950
SW2 added this option to PC1’s message.
39
00:03:57,949 --> 00:04:02,389
SW1 received it on an untrusted port, so it\ndiscarded it.
40
00:04:02,389 --> 00:04:06,529
Let’s go back to realtime mode now, and\nfix that.
41
00:04:06,530 --> 00:04:14,500
On SW1 first, I’ll configure NO IP DHCP\n
42
00:04:14,500 --> 00:04:19,408
By the way, you can see the syslog messages\n
43
00:04:19,408 --> 00:04:25,680
Notice it says option82 value on untrusted\n
44
00:04:25,680 --> 00:04:29,579
And then I’ll configure the same on SW2\nalso.
45
00:04:29,579 --> 00:04:33,558
NO IP DHCP SNOOPING INFORMATION OPTION.
46
00:04:33,559 --> 00:04:38,139
I’ve explained why we need to use this command\n
47
00:04:39,300 --> 00:04:44,668
Just remember that it’s necessary if the\n
48
00:04:44,668 --> 00:04:49,269
Okay, let’s try that again on PC1.
49
00:04:52,509 --> 00:04:58,500
Okay, this time it works and PC1 was able\nto get an IP address.
50
00:04:58,500 --> 00:05:01,699
So, in this lab we configured DHCP snooping.
51
00:05:01,699 --> 00:05:04,220
It’s fairly simple to configure.
52
00:05:04,220 --> 00:05:08,909
The only thing that can be tricky is remembering\n
53
00:05:08,908 --> 00:05:11,569
As you can see, it can cause problems if you\ndon’t.
54
00:05:11,569 --> 00:05:14,278
Okay, that’s all for this lab.
55
00:05:14,278 --> 00:05:18,759
Now let’s take a look at a lab in Boson\n
4560
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.