Dynamic ARP inspection configuration............................................. 334
Displaying ARP inspection status and ports..................................... 335
Displaying the ARP table ................................................................. 335
Multi-VRF support............................................................................. 336
DHCP snooping............................................................................................ 336
How DHCP snooping works..............................................................337
System reboot and the binding database..........................................338
Configuration notes and feature limitations for DHCP snooping.......338
Configuring DHCP snooping............................................................. 339
Clearing the DHCP binding database............................................... 340
Displaying DHCP snooping status and ports.................................... 340
Displaying the DHCP snooping binding database............................ 340
Displaying DHCP binding entry and status....................................... 340
DHCP snooping configuration example ........................................... 341
Multi-VRF support............................................................................. 341
DHCP relay agent information ..................................................................... 342
Configuration notes for DHCP option 82...........................................343
DHCP Option 82 sub-options............................................................344
DHCP option 82 configuration...........................................................345
Viewing information about DHCP option 82 processing................... 347
Configuring the source IP address of a DHCP-client packet on
the DHCP relay agent..................................................................349
IP source guard.............................................................................................349
Configuration notes and feature limitations for IP source guard....... 349
Enabling IP source guard on a port...................................................351
Defining static IP source bindings..................................................... 351
Enabling IP source guard per-port-per-VLAN................................... 351
Enabling IP source guard on a VE.................................................... 351
Enabling IP Source Guard to support a Multi-VRF instance............. 352
Displaying learned IP addresses.......................................................352
DHCPv6................................................................................................................................355
Supported DHCPv6 packet inspection and tracking features....................... 355
Securing IPv6 address configuration............................................................ 355
DHCPv6 snooping.........................................................................................355
How DHCPv6 snooping works.......................................................... 356
Configuration notes and feature limitations for DHCPv6 snooping... 357
Configuring DHCPv6 snooping......................................................... 357
Clearing the DHCPv6 binding database........................................... 358
Displaying DHCPv6 snooping status and ports ............................... 358
Displaying the DHCPv6 snooping binding database ........................359
DHCPv6 snooping configuration example ....................................... 359
Multi-VRF support for DHCPv6 snooping......................................... 359
IPv6 RA Guard.......................................................................................................................361
Supported platforms for the IPv6 RA guard feature...................................... 361
Securing IPv6 address configuration............................................................ 361
IPv6 RA guard overview................................................................................361
RA guard policy.................................................................................362
Whitelist.............................................................................................362
Prefix list............................................................................................362
Maximum preference........................................................................ 362
Trusted, untrusted, and host ports.................................................... 362
Configuration notes and feature limitations for IPv6 RA guard..................... 363
Configuring IPv6 RA guard........................................................................... 363
Example of configuring IPv6 RA guard......................................................... 364
FastIron Ethernet Switch Security Configuration Guide
11
53-1003088-03
Komentarze do niniejszej Instrukcji