If attackers maliciously apply for IP addresses from the DHCP server, the IP address pool becomes exhausted, preventing authorized users from obtaining IP addresses. This can happen if attackers continuously apply for IP addresses by changing the client hardware address (CHADDR) field, which is the field that DHCP servers generally use to identify the MAC address of a DHCP client.
To prevent DHCP users on some interfaces from maliciously applying for IP addresses, you can limit the number of DHCP snooping binding entries that can be learned by an interface to control the number of users connected through that interface. When the number of DHCP snooping binding entries reaches the maximum value, no DHCP client can obtain an IP address through the interface. To prevent attacks carried out by continuously changing the CHADDR field in the DHCP Request message, enable the device to check whether the MAC address in the Ethernet frame header matches the CHADDR field in the DHCP message. With this function enabled, the message is only forwarded if the two values match.
The system view is displayed.