Web Management Guide-R02

Table Of Contents
Chapter 12
| Security Measures
DHCPv6 Snooping
– 372 –
If yes, continue to C.
If not, continue to B.
Check if IPv6 address in IA option is found in binding cache:
If yes, continue to C.
If not, check failed, and forward packet to trusted port.
B. Check status code in IA option:
If successful, and entry is in binding table, update lease time
and forward to original destination.
If successful, and entry is in binding cache, move entry from
binding cache to binding table, update lease time and forward
to original destination.
Otherwise, remove binding entry. and check failed.
If a DHCPv6 Relay packet is received, check the relay message
option in Relay-Forward or Relay-Reply packet, and process
client and server packets as described above.
If DHCPv6 snooping is globally disabled, all dynamic bindings are removed
from the binding table.
Additional considerations when the switch itself is a DHCPv6 client – The port(s)
through which the switch submits a client request to the DHCPv6 server must
be configured as trusted. Note that the switch will not add a dynamic entry for
itself to the binding table when it receives an ACK message from a DHCPv6
server. Also, when the switch sends out DHCPv6 client packets for itself, no
filtering takes place. However, when the switch receives any messages from a
DHCPv6 server, any packets received from untrusted ports are dropped.
DHCPv6 Snooping
Global Configuration
Use the Security > DHCP Snooping6 (Configure Global) page to enable DHCPv6
Snooping globally on the switch, or to configure MAC Address Verification.
Parameters
These parameters are displayed:
DHCPv6 Snooping Status – Enables DHCPv6 snooping globally.
(Default: Disabled)
DHCPv6 Snooping Option Remote ID – Enables the insertion of remote-id
option 37 information into DHCPv6 client messages. Remote-id option
information such as the port attached to the client, DUID, and VLAN ID is used