@@ -3229,6 +3229,37 @@ It is merely echoed by the server
3229
3229
3230
3230
</section >
3231
3231
3232
+ <section xml : id =" dhcp4-authoritative" >
3233
+ <title >Authoritative DHCPv4 Server Behavior</title >
3234
+ <para >The original DHCPv4 specification
3235
+ (<link xmlns : xlink =" http://www.w3.org/1999/xlink" xlink : href =" http://tools.ietf.org/html/rfc2131" >RFC 2131</link >)
3236
+ states that if a clients requests an address in the INIT-REBOOT state of
3237
+ which, the server has no knowledge of, the server must remain silent,
3238
+ except if the server knows that the client requests an IP address from the
3239
+ wrong network.
3240
+ By default Kea follows the behavior of the ISC dhcpd instead of the
3241
+ specification and also remains silent, if the client requests an IP
3242
+ address from the wrong network,
3243
+ because configuration information about a given network segment is not
3244
+ known to be correct.
3245
+ Kea only rejects a client's DHCPREQUEST with a DHCPNAK message, if it
3246
+ already has a lease for the client, but with a different IP address.
3247
+ Administrators can override this behavior through the
3248
+ boolean <command >authoritative</command > (<userinput >false</userinput >
3249
+ by default) setting.
3250
+ </para >
3251
+
3252
+ <para >In authoritative mode, <command >authoritative</command > set to
3253
+ <userinput >true</userinput >, Kea always rejects INIT-REBOOT requests from
3254
+ unknown clients with DHCPNAK messages.
3255
+ The <command >authoritative</command > setting can be specified in
3256
+ global, shared-network, and subnet configuration scope and is
3257
+ automatically inherited from the parent scope, if not specified.
3258
+ All subnets in a shared-network must have the same
3259
+ <command >authoritative</command > setting.
3260
+ </para >
3261
+ </section >
3262
+
3232
3263
<section xml : id =" dhcp4-dhcp4o6-config" >
3233
3264
<title >DHCPv4-over-DHCPv6: DHCPv4 Side</title >
3234
3265
<para >
0 commit comments