IPv6 networks face security threats and breaches in the form of router impersonation (man-in-the-middle attacks), address
theft, address spoofing, misconfigurations errors, and so on. The First Hop Security in IPv6 (IPv6 FHS) is a set of IPv6 security
features that protects networks by mitigating such security breaches. It does this by establishing security at the first switch
connecting the end-hosts. The first hop for a host is very often a Layer 2 switch.
IPv6 FHS consists of the IPv6 Router Advertisement Guard and IPv6 DHCP Guard security features. Each of these security features
addresses a different aspect of first hop security. To use a security feature, configure the corresponding policy.
Policies specify a particular behavior and must be attached to a target, which can be a physical interface, an EtherChannel
interface, or a VLAN. An IPv6 software policy database service stores and accesses these policies. When a policy is configured
or modified, the attributes of the policy are stored or updated in the software policy database, and applied as specified.
In addition to the security features, the IPv6 FHS Binding Table contains IPv6 neighbors connected to the device. A binding
entry includes: IP and MAC address of the host, interface, VLAN, state of the entry, etc. This database or binding table is
used by other features (such as IPv6 ND Inspection) to validate the link-layer address (LLA), the IPv4 or IPv6 address, and
the prefix binding of neighbors, to prevent spoofing and redirect attacks. The binding table updates via the IPv6 Snooping
feature and manually added static binding entries.

Note
|
The IPv6 FHS Binding Table is supported through the Switch Integrated Security Feature (SISF) feature. For more information,
refer the Switch Integrated Security Features chapter.
|
IPv6 Router Advertisement Guard
This feature enables the network administrator to block or reject unwanted or rogue Router Advertisement (RA) guard messages
that arrive at the network device platform. RAs are used by devices to announce themselves on the link. The RA Guard feature
processes the RAs and filters out invalid RAs sent by unauthorized devices. In host mode, all router-advertisement and router-redirect
messages are disallowed on the port. The RA Guard feature compares the configuration data on the Layer 2 device with the incoming
RA frame information. Once the Layer 2 device has validated the content of the RA frame and router redirect frame against
the configuration, it forwards the RA to its unicast or multicast destination. If the RA frame content is not validated, the
RA is dropped.
The SISF-based device-tracking mechanism operates by forwarding router solicitation packets on interfaces configured with
RA guard policies and designated as router-facing. If no such interface exists, the router solicitation messages are dropped,
which might delay the router discovery for onboarding hosts as they will be unable to discover the router until it sends a
periodic unsolicited router advertisement.