DHCPv6 Snooping Overview
The DHCP Version 6 (DHCPv6) Snooping feature enhances security by recording IPv6 address obtained by monitoring DHCP messages. This feature allows a network administrator to compare the IPv6 address obtained when the user browses the internet, to the IPv6 addresses in the DHCPv6 server and confirm a user's identity by looking at the MAC address associated to the IPv6 address.
DHCPv6 snooping requires configuring a port as trusted or untrusted. Trusted ports connect to either DHCP servers or ports of other devices in the network. Untrusted ports connect to either DHCP clients or other networks. A DHCPv6 snooping-enabled device monitors and validates the DHCPv6 messages that it receives. Untrusted ports drop the DHCPv6-reply and DHCPv6-advertise messages that are received from DHCP servers. Trusted ports forward the received DHCP messages to the correct IPv6 address.
DHCPv6 Option 18 and DHCPv6 Option 37
A DHCPv6 relay agent is used to relay messages between the client and the server.
The DHCPv6 allows configuring a relay agent with the following two options:
-
The interface-ID option or also known as Option 18 allows a relay agent to send the interface ID to identify the port which has received the information from client side. If a relay agent receives a RELAY-RELAY packet that contains also the interface ID, the relay agent relays this information to client side through the interface enabled with the interface-ID option.
-
The remote-ID option or also known as Option 37 allows a relay device to include either the hostname or the IPv4 or IPv6 address of the relay device during transmission.
Limit the Number of DHCPv6 Clients
A DHCPv6 server addresses can be exhausted if a network attacker requests multiple IPv6 addresses disguised as multiple users. To avoid this, you can limit the number of DHCPv6 clients with any of the following methods:
-
Limit the number of DHCPv6 clients access to a device's physical port: In this case, an attack will be restricted to a physical port and not the whole network.
-
Limit the number of DHCPv6 clients access to a specific VLAN: In this case, an attack will be restricted to the attacker and the users connected in the same VLAN rather than the entire network.