Cisco DHCP Snooping & Dynamic ARP Inspection

Поделиться
HTML-код
  • Опубликовано: 30 янв 2025
  • КиноКино

Комментарии • 40

  • @learn001
    @learn001 4 года назад

    I read the whole chapter about DHCP Snooping and Dynamic ARP Inspection. by watching less then 10 minutes your videos I know I have not deeply understand the topics yet. Thank you very much for sharing this lecture.

  • @parastish270
    @parastish270 11 лет назад +2

    Great video... Explained everything thoroughly with example... One of my best learning experience... A MUST THUPS UP

  • @cnxduo65
    @cnxduo65 12 лет назад

    Very well put together. Much better than some of the other "Expert" videos out there !!!

  • @ashokreddyb5440
    @ashokreddyb5440 8 лет назад +1

    Hi.. I'm from India.. Extremely resourceful stuff.... I have googled for these topics and found many, but they gave me vague idea.. but this is outstanding.. the way you elucidated is unparallel. Hats off. You have got good teaching skills.. why don't you make more videos on switching topics.. which really helps a lot for the poor people like me.
    Even though you are bounded in tight schedules..please find some time and make videos on "stormcontrol" and "network troubleshooting". This is my personal appeal. A big thanks for the stuff.

  • @iliasanashvili5405
    @iliasanashvili5405 6 лет назад

    Finally found a video that explains DAI in depth and gives you clear understanding of everything you need to know. Thanks a lot

  • @kahilzinger
    @kahilzinger 6 лет назад

    I love how deep you go into the topics. Very helpful for a complete understanding of the topic.

  • @5710fahad
    @5710fahad 6 лет назад

    Simply WOW !!!
    Respect all the way from India !!!
    Keep up the good work !!!

  • @alvarox75
    @alvarox75 9 лет назад

    Hello Brian. Excellent video. I had some questions about how to use DAI when having statically configured clients and this video answered all of those questions. Good Job pal!

  • @refaiabdeen5943
    @refaiabdeen5943 7 лет назад

    Awesome presentation & explanation mate !! Looking forward to seeing more. Cheers

  • @lamtram413
    @lamtram413 9 лет назад

    Very informative on both subjects, thanks Brian!

  • @stajkowski1000
    @stajkowski1000  11 лет назад

    Thanks for the added information, and I appreciate the comments!

  • @stephenjoe6051
    @stephenjoe6051 10 лет назад

    Brilliant Brian GREAT ! THANKS for such in-depth.

  • @clementduval3917
    @clementduval3917 8 лет назад +1

    your videos are amazing man, instructionnal and very detailed , I hope you'll upload somme more!! What certif do you have ? What is your daily job ? You should really teach at INE or CBT , you are way better than some / most of the teachers there.

    • @stajkowski1000
      @stajkowski1000  8 лет назад +1

      Thank You! I manage software developers at Rackspace currently. These were made when going for my CCIE, which I didn't get cause I ran out of money. But, I'm trying to get the time to add more. Thanks for watching!

  • @amir140886
    @amir140886 11 лет назад +1

    Thanks for the video, very useful. But I have one point which is in my opinion wrong, or better said - not neccesary:
    The snooping "Trust" hasn't to be set in both directions of the trunk. In a non-redundant topology like in this case, the "Trust" is only needed on the interface that is pointing up towards DHCP server. So when you look at 12:42, the middle one "T" is not needed.
    If it was a redundant topology - due to STP - it could be necessary in some situations to set it on both sides.

  • @maheshirk
    @maheshirk 5 лет назад

    Excellent explanation !

  • @som2025
    @som2025 11 лет назад

    Just awesome,brilliant,mind blowing and sublime.Thanks a lottttttt.

  • @rupinder2127
    @rupinder2127 5 лет назад

    AWESOME Video ....

  • @joemendola
    @joemendola 11 лет назад

    just one thing: the procedure is called BUBU (it is an acronym), you can find out it, using wireshark; indeed the offer packet and the final ack packet are sent in unicast (lvl2)

  • @aboyd1227
    @aboyd1227 11 лет назад

    terrific in-depth video

  • @ferozsyed2014
    @ferozsyed2014 10 лет назад

    Awesome explanation sir, Thanks!!

  • @stajkowski1000
    @stajkowski1000  12 лет назад

    Thanks for the comment, putting together a few more videos, frame, 802.1x, bgp, etc.

  • @MrLittle0inker
    @MrLittle0inker 8 лет назад

    Briliant!! Thank you, sir!

  • @prabhatbhatti
    @prabhatbhatti 11 лет назад

    Excellent explanation .. Wawooooooooooooooooooooooooooo

  • @mustafajak3249
    @mustafajak3249 8 лет назад

    wow it just amazing and wonderful thank you very much

  • @vujk
    @vujk 11 лет назад

    Hi Brian, when are you going to upload more video?Well done i really like the way you explain...

  • @zulfadhlinasir352
    @zulfadhlinasir352 6 лет назад

    Hello Brian, I dont think DHCPSnooping will block the DHCPDiscovery on untrusted port around minutes 18:00. Instead its actually blocking the DHCPOffer coming from the server. Pls correct me if I am wrong.

  • @stajkowski1000
    @stajkowski1000  11 лет назад

    The main thing to be concerned about is the trust ports for both. The gateway or DHCP server must be trusted, everything else is covered in the video. I tried to be comprehensive on the subject and not very much is left out.

  • @parastish270
    @parastish270 11 лет назад

    Question, what if there are multiple VLANs, some of them assigned on the switchports but others are not (a common production scenario). Is there anything to be considered before apply DHCP snooping and arp inspection?

  • @isse_swe
    @isse_swe 10 лет назад

    Brian, great instructional. I will be using this at work.
    What is that software you are using for white-boarding?

  • @jgolbez
    @jgolbez 9 лет назад

    Have you figured out a good way to make the DHCP binding table redundant when it's needed by two or more switches, as in the case of HSRP? The only way I can figure is to set up load balancing to multiple FTP servers and replicate the table between them since you can't specify multiple destinations for the table to be written.

  • @marcosgarrido275
    @marcosgarrido275 4 года назад

    If you add gloablly for example:
    ip arp inspection vlan 55
    ip arp inspection validate src-mac
    ip dhcp snooping vlan 55
    ip dhcp snooping
    You only activate arp inspection and dhcp snooping for vlan 55 and not any other vlans, correct?
    in any switchported interfaces that includes this vlan 55 you must add dhcp snooping trust sentence even if you allow more vlans and not just vlan 55 over that interface?
    Thanks in advance

  • @stajkowski1000
    @stajkowski1000  11 лет назад

    Thank You!

  • @jetmelt
    @jetmelt 8 лет назад

    Please sir, more cisco teaching!

  • @immujan
    @immujan 11 лет назад

    This is a great video. But I want to know IOS ver on, either 3750 or 3660, which it works on.

  • @andreiignat3194
    @andreiignat3194 5 лет назад

    I think that something`s wrong over there , when the pc is making the DHCP discover the address used as destination is broadcast FF:FF:FF:FF:FF:FF , but when the server respond with the DHCP offer then the address used is unicast, the L1 MAC address, not broadcast like you said. Only the dhc discover is broadcast, all over that are unicast betwen server and l1

  • @h55ma
    @h55ma 3 года назад

    43