CCNP Enarsi Flashcards
IPv6: RA Guard
Protects against rogue Router Advertisements (RA).
IPv6: DHCPv6 Guard
Protects against rogue DHCPv6 servers.
IPv6: Source Guard
Prevents IPv6 address spoofing by validating source addresses.
IPv6: Prefix Guard
Blocks the advertisement of unauthorized IPv6 prefixes.
IPv6: NA Guard
Protects against rogue Neighbor Advertisements (NA).
IPv4: DHCPDISCOVER
Sent by the client to locate available DHCP servers.
IPv4: DHCPOFFER
Sent by the DHCP server in response to a DHCPDISCOVER offering an IP lease.
IPv4: DHCPREQUEST
Sent by the client to request an offered IP or renew an existing lease.
DHCPACKIPv4:
Sent by the server to acknowledge the client’s DHCPREQUEST and finalize the IP lease.
IPv4: DHCPNAK
Sent by the server if the requested IP address is invalid or cannot be assigned.
IPv4: DHCPDECLINE
Sent by the client if the offered IP address is already in use.
IPv4: DHCPRELEASE
Sent by the client to release the assigned IP address back to the server.
IPv4: DHCPINFORM
Sent by the client to request additional configuration without obtaining an IP address.
IPv6: SOLICIT
Sent by the client to discover available DHCPv6 servers.
IPv6: ADVERTISE
Sent by the DHCPv6 server in response to a SOLICIT advertising its availability.
IPv6: REQUEST
Sent by the client to request configuration or IP from the DHCPv6 server.
IPv6: REPLY
Sent by the server in response to a REQUEST confirming the IP lease or providing configuration data.
IPv6: RENEW
Sent by the client to renew a current lease before it expires.
IPv6: REBIND
Sent by the client to extend an expiring lease if the original server is unreachable.
IPv6: DECLINE
Sent by the client to reject an IP address that is already in use.
IPv6: RELEASE
Sent by the client to release an assigned IP address.
IPv6: CONFIRM
Sent by the client to confirm the validity of a previously assigned IP address.
IPv6: INFORMATION-REQUEST
Sent by the client to request configuration information without an IP address.
uRPF: Strict Mode
Checks if the source address of the packet has a valid route through the same interface it was received on.
“ip verify unicast source reachable-via rx”