300
Command and hardware compatibility
Commands and descriptions for centralized devices apply to the following routers:
• MSR1002-4/1003-8S.
• MSR2003.
• MSR2004-24/2004-48.
• MSR3012/3024/3044/3064.
• MSR954(JH296A/JH297A/JH298A/JH299A/JH373A).
• MSR958(JH300A/JH301A).
Commands and descriptions for distributed devices apply to MSR4060 and MSR4080 routers.
DHCPv6 snooping configuration task list
Tasks at a glance
(Required.) Configuring basic DHCPv6 snooping
(Optional.) Configuring Option 18 and Option 37
(Optional.) Configuring DHCPv6 snooping entry auto backup
(Optional.) Setting the maximum number of DHCPv6 snooping entries
(Optional.) Enabling DHCPv6-REQUEST check
(Optional.) Configuring a DHCPv6 packet blocking port
(Optional.) Enabling DHCPv6 snooping logging
Configuring basic DHCPv6 snooping
Follow these guidelines when you configure basic DHCPv6 snooping:
• To make sure DHCPv6 clients can obtain valid IPv6 addresses, specify the ports connected to
authorized DHCPv6 servers as trusted ports. The trusted ports and the ports connected to
DHCPv6 clients must be in the same VLAN.
• If you configure DHCPv6 snooping settings on a Layer 2 Ethernet interface that is a member
port of a Layer 2 aggregate interface, the settings do not take effect unless the interface is
removed from the aggregation group.
To configure basic DHCPv6 snooping:
Step Command Remarks
1. Enter system view.
system-view
N/A
2. Enable DHCPv6 snooping.
ipv6
dhcp
snooping
enable
By default, DHCPv6 snooping is
disabled.
3. Enter interface view.
interface
interface-type
interface-number
This interface must connect to the
DHCPv6 server.
4. Specify the port as a trusted
port.
ipv6
dhcp
snooping
trust
By default, all ports are untrusted
ports after DHCPv6 snooping is
enabled.