Web Management Guide-R04
Table Of Contents
- How to Use This Guide
- Contents
- Figures
- Tables
- Getting Started
- Web Configuration
- Using the Web Interface
- Basic Management Tasks
- Displaying System Information
- Displaying Hardware/Software Versions
- Configuring Support for Jumbo Frames
- Displaying Bridge Extension Capabilities
- Managing System Files
- Setting the System Clock
- Configuring the Console Port
- Configuring Telnet Settings
- Displaying CPU Utilization
- Configuring CPU Guard
- Displaying Memory Utilization
- Resetting the System
- Interface Configuration
- VLAN Configuration
- Address Table Settings
- Spanning Tree Algorithm
- Congestion Control
- Class of Service
- Layer 2 Queue Settings
- Layer 3/4 Priority Settings
- Setting Priority Processing to IP Precedence/DSCP or CoS
- Mapping Ingress DSCP Values to Internal DSCP Values
- Mapping CoS Priorities to Internal DSCP Values
- Mapping Internal DSCP Values to Egress CoS Values
- Mapping IP Precedence Values to Internal DSCP Values
- Mapping IP Port Priority to Internal DSCP Values
- Quality of Service
- VoIP Traffic Configuration
- Security Measures
- AAA Authentication, Authorization and Accounting
- Configuring User Accounts
- Web Authentication
- Network Access (MAC Address Authentication)
- Configuring HTTPS
- Configuring the Secure Shell
- Access Control Lists
- Filtering IP Addresses for Management Access
- Configuring Port Security
- Configuring 802.1X Port Authentication
- DoS Protection
- DHCPv4 Snooping
- DHCPv6 Snooping
- IPv4 Source Guard
- IPv6 Source Guard
- ARP Inspection
- Application Filter
- Basic Administration Protocols
- Configuring Event Logging
- Link Layer Discovery Protocol
- Simple Network Management Protocol
- Configuring Global Settings for SNMP
- Setting Community Access Strings
- Setting the Local Engine ID
- Specifying a Remote Engine ID
- Setting SNMPv3 Views
- Configuring SNMPv3 Groups
- Configuring Local SNMPv3 Users
- Configuring Remote SNMPv3 Users
- Specifying Trap Managers
- Creating SNMP Notification Logs
- Showing SNMP Statistics
- Remote Monitoring
- Switch Clustering
- Setting a Time Range
- Ethernet Ring Protection Switching
- OAM Configuration
- Connectivity Fault Management
- Configuring Global Settings for CFM
- Configuring Interfaces for CFM
- Configuring CFM Maintenance Domains
- Configuring CFM Maintenance Associations
- Configuring Maintenance End Points
- Configuring Remote Maintenance End Points
- Transmitting Link Trace Messages
- Transmitting Loop Back Messages
- Transmitting Delay-Measure Requests
- Displaying Local MEPs
- Displaying Details for Local MEPs
- Displaying Local MIPs
- Displaying Remote MEPs
- Displaying Details for Remote MEPs
- Displaying the Link Trace Cache
- Displaying Fault Notification Settings
- Displaying Continuity Check Errors
- OAM Configuration
- UDLD Configuration
- LBD Configuration
- Smart Pair Configuration
- Multicast Filtering
- Overview
- Layer 2 IGMP (Snooping and Query for IPv4)
- Configuring IGMP Snooping and Query Parameters
- Specifying Static Interfaces for a Multicast Router
- Assigning Interfaces to Multicast Services
- Setting IGMP Snooping Status per Interface
- Filtering IGMP Query Packets and Multicast Data
- Displaying Multicast Groups Discovered by IGMP Snooping
- Displaying IGMP Snooping Statistics
- Filtering and Throttling IGMP Groups
- MLD Snooping (Snooping and Query for IPv6)
- Multicast VLAN Registration for IPv4
- Multicast VLAN Registration for IPv6
- Basic IP Functions
- IP Configuration
- General IP Routing
- IP Services
- Appendices
- Glossary
Chapter 12
| Security Measures
DHCPv6 Snooping
– 380 –
◆ DHCPv6 Snooping Option Remote ID – Enables the insertion of remote-id
option 37 information into DHCPv6 client messages. Remote-id option
information such as the port attached to the client, DUID, and VLAN ID is used
by the DHCPv6 server to assign preassigned configuration data specific to the
DHCPv6 client. (Default: Disabled)
■
DHCPv6 provides a relay mechanism for sending information about the
switch and its DHCPv6 clients to the DHCPv6 server. Known as DHCPv6
Option 37, it allows compatible DHCPv6 servers to use the information
when assigning IP addresses, or to set other services or policies for clients.
■
When DHCPv6 Snooping Information Option 37 is enabled, the requesting
client (or an intermediate relay agent that has used the information fields
to describe itself) can be identified in the DHCPv6 request packets
forwarded by the switch and in reply packets sent back from the DHCPv6
server.
■
When the DHCPv6 Snooping Option 37 is enabled, clients can be identified
by the switch port to which they are connected rather than just their MAC
address. DHCPv6 client-server exchange messages are then forwarded
directly between the server and client without having to flood them to the
entire VLAN.
■
DHCPv6 snooping must be enabled for the DHCPv6 Option 37 information
to be inserted into packets. When enabled, the switch will either drop, keep
or remove option 37 information in incoming DHCPv6 packets. Packets are
processed as follows:
■
If an incoming packet is a DHCPv6 request packet with option 37
information, it will modify the option 37 information according to the
settings specified.
■
If an incoming packet is a DHCPv6 request packet without option 37
information, enabling the DHCPv6 snooping information option will
add option 37 information to the packet.
■
If an incoming packet is a DHCPv6 reply packet with option 37
information, enabling the DHCPv6 snooping information option will
remove option 37 information from the packet.
■
When this switch inserts Option 37 information in DHCPv6 client request
packets, the switch’s MAC address (hexadecimal) is used for the remote ID.
◆ DHCPv6 Snooping Option Policy – Sets the remote-id option policy for
DHCPv6 client packets that include Option 37 information.
When the switch receives DHCPv6 packets from clients that already include
DHCP Option 37 information, the switch can be configured to set the action
policy for these packets. The switch can either drop the DHCPv6 packets, keep
the existing information, or replace it with the switch’s relay agent information.