Dynamic IPv6 source guard using ND snooping
Network requirements
The client is connected to the device through port GigabitEthernet 1/0/1.
Enable ND snooping on the device, establishing ND snooping entries by listening to DAD NS messages.
Enable the IPv6 source guard function on port GigabitEthernet 1/0/1 to filter packets based on the ND snooping entries, allowing only packets with a legally obtained IPv6 address to pass.
Figure 114: Network diagram
Configuration procedure
Configure ND snooping.
# In VLAN 2, enable ND snooping.
<Device> system-view [Device] vlan 2 [Device-vlan2] ipv6 nd snooping enable [Device-vlan2] quit
Configure the IPv6 source guard function.
# Configure the IPv6 source guard function on GigabitEthernet 1/0/1 to filter packets based on both the source IP address and MAC address.
[Device] interface gigabitethernet 1/0/1 [Device-GigabitEthernet1/0/1] ipv6 verify source ipv6-address mac-address [Device-GigabitEthernet1/0/1] quit
Verifying the configuration
# Display the IPv6 source guard entries generated on port GigabitEthernet 1/0/1.
[Device] display ipv6 source binding Total entries found: 1 MAC Address IP Address VLAN Interface Type 040a-0000-0001 2001::1 2 GE1/0/1 ND-SNP
# Display the IPv6 ND snooping entries to see whether they are consistent with the dynamic IP source guard entries generated on GigabitEthernet 1/0/1.
[Device] display ipv6 nd snooping IPv6 Address MAC Address VID Interface Aging Status 2001::1 040a-0000-0001 2 GE1/0/1 25 Bound ---- Total entries: 1 ----
The output shows that a dynamic IPv6 source guard entry has generated on port GigabitEthernet 1/0/1 based on the ND snooping entry.