BCP 199

RFC 7610

DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers, August 2015

File formats:
icon for text file icon for PDF icon for HTML
Status:
BEST CURRENT PRACTICE
Authors:
F. Gont
W. Liu
G. Van de Velde
Stream:
IETF
Source:
opsec (ops)

Cite this RFC: TXT  |  XML  |   BibTeX

DOI:  https://doi.org/10.17487/RFC7610

Discuss this RFC: Send questions or comments to the mailing list opsec@ietf.org

Other actions: Submit Errata  |  Find IPR Disclosures from the IETF  |  View History of RFC 7610


Abstract

This document specifies a mechanism for protecting hosts connected to a switched network against rogue DHCPv6 servers. It is based on DHCPv6 packet filtering at the layer 2 device at which the packets are received. A similar mechanism has been widely deployed in IPv4 networks ('DHCP snooping'); hence, it is desirable that similar functionality be provided for IPv6 networks. This document specifies a Best Current Practice for the implementation of DHCPv6-Shield.


For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 8729.




Advanced Search