Configuring IPv6/MAC Spoofing Attack Defense

This section describes how to configure the IPv6 packet check function, a static binding table, and a policy for detecting IPv6 packets to prevent IPv6/MAC spoofing attacks against a DHCPv6 server.

Usage Scenario

When an IPv6/MAC spoofing attack occurs on a network, the attacker forges a DHCPv6 client, and the DHCPv6 server incorrectly considers that all the packets are sent to or received from this client. However, these packets actually have been tampered with. In this way, the attacker can obtain data from the DHCPv6 server.

To prevent IPv6/MAC spoofing attacks, you can configure DHCPv6 snooping on a device. The device then forwards a packet only when the information in the packet matches an entry in the DHCPv6 snooping binding table. Otherwise, the device discards the packet.

Pre-configuration Tasks

Before configuring IPv6/MAC spoofing attack defense on a Layer 3 device, complete the following task:

  • Configure DHCPv6 snooping.
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >