Web Management Guide-R01

Table Of Contents
Chapter 12
| Security Measures
DHCPv6 Snooping
– 364 –
To show the VLANs for which DHCPv6 Snooping is enabled:
1. Click Security, DHCP Snooping6.
2. Select Configure VLAN from the Step list.
3. Select Show from the Action list.
Figure 226: Showing VLANs Enabled for DHCPv6 Snooping
Configuring Interfaces
for DHCPv6 Snooping
Use the Security > DHCP Snooping6 (Configure Interface) page to configure switch
interfaces as trusted or untrusted, and set the maximum number of entries which
can be stored in the binding database for an interface.
Command Usage
A trusted interface is an interface that is configured to receive only messages
from within the network. An untrusted interface is an interface that is
configured to receive messages from outside the network or fire wall.
Set all interfaces connected to DHCv6 servers within the local network or fire
wall to trusted, and all other interfaces outside the local network or fire wall to
untrusted.
When DHCPv6 snooping is enabled globally and enabled on a VLAN, DHCPv6
packet filtering will be performed on any untrusted ports within the VLAN
according to the default status, or as specifically configured for an interface.
When an untrusted port is changed to a trusted port, all the dynamic DHCPv6
snooping bindings associated with this port are removed.
Additional considerations when the switch itself is a DHCPv6 client – The port(s)
through which it submits a client request to the DHCPv6 server must be
configured as trusted.
Parameters
These parameters are displayed:
Interface – Port or trunk identifier.
Trust Status – Enables or disables an interface as trusted. (Default: Disabled)