Chapter 32 dhcpv6 snooping configuration, 1 introduction to dhcpv6 snooping, 1 defense against fake dhcpv6 server – PLANET XGS3-24040 User Manual

Page 240: 2 defense against fake ipv6 address, 4 defense against nd cheat, 5 reply the remove requirement for port, Ntroduction to, Dhcp, Nooping

Advertising
background image

Chapter 32 DHCPv6 Snooping Configuration

32-1

Chapter 32 DHCPv6 Snooping Configuration

32.1 Introduction to DHCPv6 Snooping

DHCPv6 Snooping monitors the interaction flow of the packets between DHCPv6 client and server, so as to
create the binding table of the user, and implement all kinds of security policies based on the binding table.
DHCPv6 Snooping has the following functions:

32.1.1 Defense against Fake DHCPv6 Server

DHCPv6 Snooping can set the port of connecting DHCPv6 server as the trust port, other ports as the

un-trusted ports by default, so as to avoid the user to configure DHCPv6 server privately in network. DHCPv6

Snooping does not forward DHCPv6 response packets which are received by the un-trusted ports, and

according to the source MAC of the received DHCPv6 response packets to implement the security policy. For

example, this MAC is set as a blackhole MAC within a period, or this port is directly shutdown within a period.

32.1.2 Defense against Fake IPv6 Address

DHCPv6 Snooping function can send the control list entries based the binding on the port. The port denies all

IPv6 traffic by default, it only allows to forward IPv6 packets of which the IPv6 addresses and the MAC

addresses are bound by this port as the source. In this way, it can effectively prevent the malicious user fake

or privately set IPv6 address to access the network.

32.1.3 Defense against the attack of DHCPv6 addresses

exhaustion

DHCPv6 Snooping can limit the binding number of the port. The port of which the binding number exceeds

the threshold, does not forward and drop the after DHCPv6 application packets. In this way, it can effectively

prevent the attack of DHCPv6 addresses exhaustion.

32.1.4 Defense against ND cheat

The IPv6 address obtained by DHCPv6 protocol can be trustier in IPv6 network, so DHCPv6 Snooping can

convert the binding list entries to static one, and effectively prevent the attack of ND cheat to a gateway device.

The function of binding ND for DHCPv6 Snooping needs to be enabled on the device of layer 3 gateway.

32.1.5 Reply the remove requirement for port

Through capturing the ports of DHCPv6 packets, DHCPv6 Snooping judges the port connected to the

DHCPv6 user. After DHCPv6 Snooping binding is created, if DHCPv6 Snooping receives

CONFIRM/REQUEST packets and response packets of DHCPv6 client from other ports, it needs to use DAD

NS/NA to detect whether the binding of the original port is still usable, if it is still usable (that means to receive

the response of DAD NA), then do not create new binding on new port, contrarily (that means the response of

DAD NA is not received in set time), create the binding on new port and deletes the binding on the original

port.

Advertising