The dhcpv6 snooping nomatch-packet ipv6 action forward command configures a forward policy for checking whether IPv6 packets match entries in the DHCPv6 snooping binding table on an interface.
The undo dhcpv6 snooping nomatch-packet ipv6 action forward command restores the discard policy for checking whether IPv6 packets match entries in the DHCPv6 snooping binding table on an interface.
By default, a strong policy is used to check whether IPv6 packets on an interface match the DHCPv6 snooping binding table.
100GE interface view, 10GE interface view, 25GE interface view, 400GE interface view, 40GE interface view, 50GE interface view, Eth-Trunk interface view, FlexE sub-interface view, FlexE interface view, GE optical interface view, GE interface view, GE electrical interface view, Global VE sub-interface view, VE sub-interface view, Sub-interface view
Usage Scenario
In DHCPv6 applications, if IPv6/MAC spoofing attacks occurs, you can configure the device to check IPv6 packets by determining whether the source IPv6 address and source MAC address in IPv6 packets match entries in the DHCPv6 snooping binding table. The rules for checking whether IPv6 packets match entries in the DHCPv6 snooping binding table are classified into discard and forward policies.
Prerequisites
DHCPv6 snooping has been enabled globally using the dhcpv6 snooping enable command in the system view.
DHCPv6 snooping has been enabled on the interface using the dhcpv6 snooping enable command in the interface view.<HUAWEI> system-view [~HUAWEI] dhcpv6 snooping enable [*HUAWEI] interface GigabitEthernet 0/1/0 [*HUAWEI-GigabitEthernet0/1/0] dhcpv6 snooping enable [*HUAWEI-GigabitEthernet0/1/0] dhcpv6 snooping nomatch-packet ipv6 action forward