<s>
In	O
computer	B-Architecture
networking	I-Architecture
,	O
DHCP	B-Protocol
snooping	I-Protocol
is	O
a	O
series	O
of	O
techniques	O
applied	O
to	O
improve	O
the	O
security	O
of	O
a	O
DHCP	B-Protocol
infrastructure	O
.	O
</s>
<s>
DHCP	B-Protocol
servers	I-Protocol
allocate	O
IP	B-Protocol
addresses	I-Protocol
to	O
clients	B-Protocol
on	O
a	O
LAN	B-General_Concept
.	O
</s>
<s>
DHCP	B-Protocol
snooping	I-Protocol
can	O
be	O
configured	O
on	O
LAN	B-Protocol
switches	I-Protocol
to	O
exclude	O
rogue	B-Protocol
DHCP	I-Protocol
servers	I-Protocol
and	O
remove	O
malicious	O
or	O
malformed	O
DHCP	B-Protocol
traffic	O
.	O
</s>
<s>
In	O
addition	O
,	O
information	O
on	O
hosts	O
which	O
have	O
successfully	O
completed	O
a	O
DHCP	B-Protocol
transaction	O
is	O
accrued	O
in	O
a	O
database	O
of	O
bindings	O
which	O
may	O
then	O
be	O
used	O
by	O
other	O
security	O
or	O
accounting	O
features	O
.	O
</s>
<s>
Other	O
features	O
may	O
use	O
DHCP	B-Protocol
snooping	I-Protocol
database	O
information	O
to	O
ensure	O
IP	O
integrity	O
on	O
a	O
Layer	B-Protocol
2	I-Protocol
switched	O
domain	O
.	O
</s>
<s>
Track	O
the	O
physical	O
location	O
of	O
IP	B-Protocol
addresses	I-Protocol
when	O
combined	O
with	O
AAA	O
accounting	O
or	O
SNMP	B-Protocol
.	O
</s>
<s>
Ensure	O
that	O
hosts	O
only	O
use	O
the	O
IP	B-Protocol
addresses	I-Protocol
assigned	O
to	O
them	O
when	O
combined	O
with	O
source-guard	O
a.k.a.	O
</s>
