Skip to content

Switch DHCP Server Policy Configuration

Dashboard Location: Switching > DHCP Servers and ARP

Switch DHCP server policy configuration in Meraki networks provides administrators with comprehensive DHCP security controls, enabling network protection against rogue DHCP servers, ARP spoofing attacks, and unauthorized network services. This functionality supports DHCP server validation, ARP inspection, policy enforcement, email alerting, and network traffic monitoring. DHCP server policies are essential for maintaining network integrity, preventing IP address conflicts, securing Layer 2 communications, and ensuring reliable network services in enterprise environments.

Diagram

switch (meraki.domains.organizations.networks)

Section titled “switch (meraki.domains.organizations.networks)”
NameTypeConstraintMandatoryDefault Value
dhcp_server_policyClass[dhcp_server_policy]No

dhcp_server_policy (meraki.domains.organizations.networks.switch)

Section titled “dhcp_server_policy (meraki.domains.organizations.networks.switch)”
NameTypeConstraintMandatoryDefault Value
default_policyChoiceallow, blockNo
allowed_serversListMACNo
blocked_serversListMACNo
arp_inspectionBooleantrue, falseNo
alerts_emailBooleantrue, falseNo
arp_inspection_trusted_serversList[arp_inspection_trusted_servers]No

arp_inspection_trusted_servers (meraki.domains.organizations.networks.switch.dhcp_server_policy)

Section titled “arp_inspection_trusted_servers (meraki.domains.organizations.networks.switch.dhcp_server_policy)”
NameTypeConstraintMandatoryDefault Value
macMACNo
vlanAnyInteger[min: 1, max: 4094] or String[matches: `(?:[1-9][1-9][0-9][1-9][0-9]2
ipv4_addressIPNo
trusted_server_nameStringmin: 1, max: 127Yes

Example-1: The example below demonstrates switch DHCP server policy configuration.

This configuration implements DHCP security policies to protect against rogue DHCP servers and ARP spoofing attacks. The example includes server allow/block lists, ARP inspection settings, and trusted server definitions for network security.

This configuration enhances Layer 2 security by enabling Dynamic ARP Inspection (DAI), which validates ARP packets against the DHCP snooping database, and denies DHCP responses from any servers not explicitly listed in the allowed_servers list (e.g., 00:50:56:00:00:01, 00:50:56:00:00:02), while explicitly blocking responses from blocked_servers such as 00:50:56:00:00:03 and 00:50:56:00:00:04. Additionally, email alerts are enabled (alerts_email: true) to notify administrators of DHCP security violations, such as unauthorized servers attempting to respond.

meraki:
domains:
- name: !env domain
administrator:
name: !env org_admin
organizations:
- name: !env org
networks:
- name: !env network_name
product_types:
- appliance
- switch
- wireless
- camera
- sensor
- cellularGateway
switch:
dhcp_server_policy:
default_policy: block
allowed_servers:
- 00:50:56:00:00:01
- 00:50:56:00:00:02
blocked_servers:
- 00:50:56:00:00:03
- 00:50:56:00:00:04
arp_inspection: true
alerts_email: true