IPv6 DHCP Snooping MAC-Address Verification
Configure to enable verify source mac-address in the DHCP packet against the mac address stored in the
snooping binding table.
• Enable IPV6 DHCP snooping .
CONFIGURATION mode
ipv6 dhcp snooping verify mac-address
Drop DHCP Packets on Snooped VLANs Only
Binding table entries are deleted when a lease expires or the relay agent encounters a DHCPRELEASE.
Line cards maintain a list of snooped VLANs. When the binding table fills, DHCP packets are dropped only on
snooped VLANs, while such packets are forwarded across non-snooped VLANs. Because DHCP packets are
dropped, no new IP address assignments are made. However, DHCP release and decline packets are allowed
so that the DHCP snooping table can decrease in size. After the table usage falls below the maximum limit of
4000 entries, new IP address assignments are allowed.
To view the number of entries in the table, use the
show ip dhcp snooping binding
command. This
output displays the snooping binding table created using the ACK packets from the trusted port.
Dell#show ip dhcp snooping binding
Codes : S - Static D - Dynamic
IP Address MAC Address Expires(Sec) Type VLAN Interface
================================================================
10.1.1.251 00:00:4d:57:f2:50 172800 D Vl 10 Te 1/2
10.1.1.252 00:00:4d:57:e6:f6 172800 D Vl 10 Te 1/1
10.1.1.253 00:00:4d:57:f8:e8 172740 D Vl 10 Te 1/3
10.1.1.254 00:00:4d:69:e8:f2 172740 D Vl 10 Te 1/5
Total number of Entries in the table : 4
Dynamic ARP Inspection
Dynamic address resolution protocol (ARP) inspection prevents ARP spoofing by forwarding only ARP frames
that have been validated against the DHCP binding table.
ARP is a stateless protocol that provides no authentication mechanism. Network devices accept ARP requests
and replies from any device. ARP replies are accepted even when no request was sent. If a client receives an
ARP message for which a relevant entry already exists in its ARP cache, it overwrites the existing entry with the
new information.
The lack of authentication in ARP makes it vulnerable to spoofing. ARP spoofing is a technique attackers use
to inject false IP-to-MAC mappings into the ARP cache of a network device. It is used to launch man-in-the-
middle (MITM), and denial-of-service (DoS) attacks, among others.
A spoofed ARP message is one in which the MAC address in the sender hardware address field and the IP
address in the sender protocol field are strategically chosen by the attacker. For example, in an MITM attack,
the attacker sends a client an ARP message containing the attacker’s MAC address and the gateway’s IP
Dynamic Host Configuration Protocol (DHCP)
362
Summary of Contents for S4048T
Page 1: ...Dell Configuration Guide for the S4048T ON System 9 10 0 1 ...
Page 98: ... saveenv 7 Reload the system uBoot mode reset Management 98 ...
Page 113: ...Total CFM Pkts 10303 CCM Pkts 0 LBM Pkts 0 LTM Pkts 3 LBR Pkts 0 LTR Pkts 0 802 1ag 113 ...
Page 411: ...mode transit no disable Force10 Resilient Ring Protocol FRRP 411 ...
Page 590: ...Figure 67 Inspecting the LAG Configuration Link Aggregation Control Protocol LACP 590 ...
Page 646: ...Figure 87 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 646 ...
Page 647: ...Figure 88 Configuring OSPF and BGP for MSDP Multicast Source Discovery Protocol MSDP 647 ...
Page 653: ...Figure 91 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 653 ...
Page 654: ...Figure 92 MSDP Default Peer Scenario 3 Multicast Source Discovery Protocol MSDP 654 ...
Page 955: ...Figure 119 Single and Double Tag First byte TPID Match Service Provider Bridging 955 ...