263
[Device] interface gigabitethernet 1/0/1
[Device-GigabitEthernet1/0/1] ip check source ipv6 ip-address mac-address
[Device-GigabitEthernet1/0/1] quit
Verification
# Display the dynamic IPv6 source guard binding entries generated on port GigabitEthernet 1/0/1.
[Device] display ip check source ipv6
Total entries found: 1
MAC Address IP Address VLAN Interface Type
040a-0000-0001 2001::1 2 GE1/0/1 DHCPv6-SNP
# Display all DHCPv6 snooping entries to see whether they are consistent with the dynamic IP source
guard entries generated on GigabitEthernet 1/0/1.
[Device] display ipv6 dhcp snooping user-binding dynamic
IP Address MAC Address Lease VLAN Interface
============================== ============== ========== ==== ==================
2001::1 040a-0000-0001 286 2 GigabitEthernet1/0/1
--- 1 DHCPv6 snooping item(s) found ---
The output shows that a dynamic IPv6 source guard entry has been generated on port GigabitEthernet
1/0/1 based on the DHCPv6 snooping entry.
Dynamic IPv6 source guard binding by ND snooping
configuration example
Network requirements
The client is connected to the device through port GigabitEthernet 1/0/1.
Enable ND snooping on the device, establishing ND snooping entries by listening to DAD NS messages.
Enable the dynamic IPv6 source guard binding function on port GigabitEthernet 1/0/1 to filter packets
based on ND snooping entries, allowing only packets with a legally obtained IPv6 address to pass.
Figure 83
Network diagram for configuring dynamic IPv6 source guard binding by ND snooping
Client
GE1/0/1
GE1/0/2
ND snooping
VLAN 2
IP network
Device
Configuration procedure
1.
Configure ND snooping
# In VLAN 2, enable ND snooping.
<Device> system-view
[Device] vlan 2
[Device-vlan2] ipv6 nd snooping enable
[Device-vlan2] quit
2.
Configure the dynamic IPv6 source guard binding function.