To prevent bogus DHCP server attacks, configure DHCP snooping, which works in either trusted or untrusted mode.
You can configure a trusted or untrusted physical or VLAN interface. DHCPRESPONSE messages (Offer, ACK, or NAK messages) received by an untrusted interface are directly discarded to prevent bogus DHCP server attacks. Figure 2 shows DHCP snooping that works in trusted or untrusted mode.
A DHCP snooping binding table can be used to prevent IP/MAC spoofing and middleman attacks.
When an interface receives an ARP or IP packet, the interface matches the source IP and MAC addresses of the packet with entries in a local DHCP snooping binding table. Packets that match the entries are forwarded, whereas unmatched packets are discarded. Figure 5 shows data transmission based on a DHCP snooping binding table.
ARP packets or IP packets sent by clients with static IP addresses are discarded. This is because these clients do not obtain IP addresses by sending DHCPREQUEST messages, and no DHCP snooping binding entry exists for them. As a result, these clients are prevented from accessing the network illegally. To allow the users with statically allocated IP addresses to access the network, configuring a static DHCP snooping binding table is mandatory.
Similarly, packets from a client that embezzle a legal IP address of other clients are discarded. The client does not obtain IP addresses by sending DHCPREQUEST messages. Hence the MAC address and interface information in the DHCP snooping binding table corresponding to the IP address are inconsistent with those of the embezzler. In this way, these clients are prevented from accessing the network illegally.
http://support.huawei.com/hedex/pages/EDOC1000177283AEG11207/02/EDOC1000177283AEG11207/02/resources/admin/sec_admin_network_dhcpsp_0002.html?ft=0&fe=10&hib=5.5.9.2&id=sec_admin_network_dhcpsp_0002&text=Mechanism&docid=EDOC1000177283>
Example for Configuring DHCP Snooping
http://support.huawei.com/hedex/pages/EDOC1000177283AEG11207/02/EDOC1000177283AEG11207/02/resources/admin/sec_admin_network_dhcpsp_0019.html?ft=0&fe=10&hib=5.5.9.9&id=sec_admin_network_dhcpsp_0019&text=CLI%3A%20Example%20for%20Configuring%20DHCP%20Snooping&docid=EDOC1000177283>