Configuring basic DHCPv6 snooping
Follow these guidelines when you configure basic DHCPv6 snooping:
To make sure DHCPv6 clients can obtain valid IPv6 addresses, specify the ports connected to authorized DHCPv6 servers as trusted ports. The trusted ports and the ports connected to DHCPv6 clients must be in the same VLAN.
If you configure DHCPv6 snooping settings on a Layer 2 Ethernet interface that is a member port of a Layer 2 aggregate interface, the settings do not take effect unless the interface is removed from the aggregation group.
To configure basic DHCPv6 snooping:
Step | Command | Remarks |
---|---|---|
1. Enter system view. | system-view | N/A |
2. Enable DHCPv6 snooping. | ipv6 dhcp snooping enable | By default, DHCPv6 snooping is disabled. |
3. Enter interface view. | interface interface-type interface-number | This interface must connect to the DHCPv6 server. |
4. Specify the port as a trusted port. | ipv6 dhcp snooping trust | By default, all ports are untrusted ports after DHCPv6 snooping is enabled. |
5. Return to system view. | quit | N/A |
6. Enter interface view. | interface interface-type interface-number | This interface must connect to the DHCPv6 client. |
7. (Optional.) Enable recording of client information in DHCPv6 snooping entries. | ipv6 dhcp snooping binding record | By default, DHCPv6 snooping does not record client information. |