
Chapter 8
| General Security Measures
DHCPv6 Snooping
– 293 –
DHCPv6 Snooping
DHCPv6 snooping allows a switch to protect a network from rogue DHCPv6 servers
or other devices which send port-related information to a DHCPv6 server. This
information can be useful in tracking an IP address back to a physical port. This
section describes commands used to configure DHCPv6 snooping.
ipv6 dhcp snooping
This command enables DHCPv6 snooping globally. Use the
no
form to restore the
default setting.
Syntax
[
no
]
ipv6 dhcp snooping
Default Setting
Disabled
Command Mode
Global Configuration
Command Usage
◆
Network traffic may be disrupted when malicious DHCPv6 messages are
received from an outside source. DHCPv6 snooping is used to filter DHCPv6
messages received on an unsecure interface from outside the network or fire
Table 56: DHCP Snooping Commands
Command
Function
Mode
Enables DHCPv6 snooping globally
GC
ipv6 dhcp snooping option
remote-id
Enables insertion of DHCPv6 Option 37 relay agent
remote-id
GC
ipv6 dhcp snooping option
remote-id policy
Sets the information option policy for DHCPv6 client
packets that include Option 37 information
GC
Enables DHCPv6 snooping on the specified VLAN
GC
ipv6 dhcp snooping
max-binding
Sets the maximum number of entries which can be
stored in the binding database for an interface
IC
Configures the specified interface as trusted
IC
clear ipv6 dhcp snooping
binding
Clears DHCPv6 snooping binding table entries from RAM PE
clear ipv6 dhcp snooping
statistics
Clears statistical counters for DHCPv6 snooping client,
server and relay packets
PE
Shows the DHCPv6 snooping configuration settings
PE
show ipv6 dhcp snooping
binding
Shows the DHCPv6 snooping binding table entries
PE
show ipv6 dhcp snooping
statistics
Shows statistics for DHCPv6 snooping client, server and
relay packets
PE
Summary of Contents for AS5700-54X
Page 42: ...Contents 42...
Page 44: ...Figures 44...
Page 52: ...Tables 52...
Page 54: ...Section I Getting Started 54...
Page 80: ...Chapter 1 Initial Switch Configuration Setting the System Clock 80...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 358: ...Chapter 9 Access Control Lists ACL Information 358...
Page 418: ...Chapter 12 Port Mirroring Commands RSPAN Mirroring Commands 418...
Page 436: ...Chapter 15 UniDirectional Link Detection Commands 436...
Page 442: ...Chapter 16 Address Table Commands 442...
Page 506: ...Chapter 18 VLAN Commands Configuring VXLAN Tunneling 506...
Page 526: ...Chapter 19 Class of Service Commands Priority Commands Layer 3 and 4 526...
Page 544: ...Chapter 20 Quality of Service Commands 544...
Page 652: ...Chapter 22 Multicast Filtering Commands MLD Proxy Routing 652...
Page 680: ...Chapter 23 LLDP Commands 680...
Page 722: ...Chapter 24 CFM Commands Delay Measure Operations 722...
Page 732: ...Chapter 25 Domain Name Service Commands 732...
Page 790: ...Chapter 27 IP Interface Commands ND Snooping 790...
Page 1072: ...Section III Appendices 1072...
Page 1102: ...List of CLI Commands 1102...
Page 1115: ......
Page 1116: ...AS5700 54X AS6700 32X E032016 ST R02 149100000198A...