Web Management Guide-R01

Table Of Contents
Chapter 12
| Security Measures
DHCPv6 Snooping
– 361 –
Additional considerations when the switch itself is a DHCPv6 client – The port(s)
through which the switch submits a client request to the DHCPv6 server must
be configured as trusted. Note that the switch will not add a dynamic entry for
itself to the binding table when it receives an ACK message from a DHCPv6
server. Also, when the switch sends out DHCPv6 client packets for itself, no
filtering takes place. However, when the switch receives any messages from a
DHCPv6 server, any packets received from untrusted ports are dropped.
DHCPv6 Snooping
Global Configuration
Use the Security > DHCP Snooping6 (Configure Global) page to enable DHCPv6
Snooping globally on the switch, or to configure MAC Address Verification.
Parameters
These parameters are displayed:
DHCPv6 Snooping Status – Enables DHCPv6 snooping globally.
(Default: Disabled)
DHCPv6 Snooping Option Remote ID – Enables the insertion of remote-id
option 37 information into DHCPv6 client messages. Remote-id option
information such as the port attached to the client, DUID, and VLAN ID is used
by the DHCPv6 server to assign preassigned configuration data specific to the
DHCPv6 client. (Default: Disabled)
DHCPv6 provides a relay mechanism for sending information about the
switch and its DHCPv6 clients to the DHCPv6 server. Known as DHCPv6
Option 37, it allows compatible DHCPv6 servers to use the information
when assigning IP addresses, or to set other services or policies for clients.
When DHCPv6 Snooping Information Option 37 is enabled, the requesting
client (or an intermediate relay agent that has used the information fields
to describe itself) can be identified in the DHCPv6 request packets
forwarded by the switch and in reply packets sent back from the DHCPv6
server.
When the DHCPv6 Snooping Option 37 is enabled, clients can be identified
by the switch port to which they are connected rather than just their MAC
address. DHCPv6 client-server exchange messages are then forwarded
directly between the server and client without having to flood them to the
entire VLAN.
DHCPv6 snooping must be enabled for the DHCPv6 Option 37 information
to be inserted into packets. When enabled, the switch will either drop, keep
or remove option 37 information in incoming DHCPv6 packets. Packets are
processed as follows:
If an incoming packet is a DHCPv6 request packet with option 37
information, it will modify the option 37 information according to the
settings specified.