If a bogus ND server is deployed at the user side, STAs may obtain incorrect IPv6 addresses and network configuration parameters, and cannot communicate properly. After the ND trusted port is disabled on an AP, the AP considers that a bogus ND server is deployed at the user side when receiving ND OFFER, ACK, and NAK packets. The AP discards the packets and reports the IPv6 address of the bogus ND server to the connected AC.
In most cases, you need to enable the ND trusted port in an AP wired port profile. When receiving ND OFFER, ACK, and NAK packets sent by authorized ND servers, the AP forwards the packets to STAs so that the STAs can obtain valid IPv6 addresses and go online. For the detailed configuration, see Managing an AP's Wired Interface.