ipv6 snooping policy
All existing IPv6 Snooping commands (prior to Cisco IOS XE Denali 16.1.1) now have corresponding
SISF-based device-tracking commands that allow you to apply your configuration to both IPv4 and IPv6
address families. For more information, see
Note
To configure an IPv6 snooping policy and enter IPv6 snooping configuration mode, use the
ipv6 snooping
policy
command in global configuration mode. To delete an IPv6 snooping policy, use the
no
form of this
command.
ipv6 snooping policy snooping-policy
no ipv6 snooping policy snooping-policy
Syntax Description
User-defined name of the snooping policy. The policy name can be a symbolic
string (such as Engineering) or an integer (such as 0).
snooping-policy
Command Default
An IPv6 snooping policy is not configured.
Command Modes
Global configuration
Command History
Modification
Release
This command was introduced.
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
Usage Guidelines
Use the
ipv6 snooping policy
command to create an IPv6 snooping policy. When the
ipv6 snooping policy
command is enabled, the configuration mode changes to IPv6 snooping configuration mode. In this mode,
the administrator can configure the following IPv6 first-hop security commands:
•
The
device-role
command specifies the role of the device attached to the port.
•
The
limit address-count maximum
command limits the number of IPv6 addresses allowed to be used
on the port.
•
The
protocol
command specifies that addresses should be gleaned with Dynamic Host Configuration
Protocol (DHCP) or Neighbor Discovery Protocol (NDP).
•
The
security-level
command specifies the level of security enforced.
•
The
tracking
command overrides the default tracking policy on a port.
•
The
trusted-port
command configures a port to become a trusted port; that is, limited or no verification
is performed when messages are received.
Command Reference, Cisco IOS XE Everest 16.5.1a (Catalyst 3650 Switches)
775
ipv6 snooping policy
Summary of Contents for Catalyst 3650 Series
Page 2: ... 2017 Cisco Systems Inc All rights reserved ...
Page 37: ...P A R T I Campus Fabric Campus Fabric page 13 ...
Page 38: ......
Page 51: ...P A R T II Interface and Hardware Components Interface and Hardware Commands page 27 ...
Page 52: ......
Page 165: ...P A R T III IP IP page 141 ...
Page 166: ......
Page 235: ...P A R T IV IP Multicast Routing IP Multicast Routing page 211 ...
Page 236: ......
Page 303: ...P A R T V IPv6 IPv6 page 279 ...
Page 304: ......
Page 307: ...P A R T VI Layer 2 3 Layer 2 3 page 283 ...
Page 308: ......
Page 399: ...P A R T VII Multiprotocol Label Switching MPLS MPLS page 375 Multicast VPN page 385 ...
Page 400: ......
Page 429: ...P A R T VIII Network Management Flexible NetFlow page 405 Network Management page 479 ...
Page 430: ......
Page 595: ...P A R T IX Programmability Programmability page 571 ...
Page 596: ......
Page 624: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 598 ping6 ...
Page 625: ...P A R T X QoS Auto QoS page 601 QoS page 641 ...
Page 626: ......
Page 666: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 640 show auto qos ...
Page 706: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 680 trust device ...
Page 707: ...P A R T XI Routing Bidirectional Forwarding Detection page 683 ...
Page 708: ......
Page 725: ...P A R T XII Security Security page 701 ...
Page 726: ......
Page 875: ...P A R T XIII Stack Manager and High Availability Stack Manager and High Availability page 851 ...
Page 876: ......
Page 912: ......
Page 1027: ...P A R T XV VLAN VLAN page 1003 ...
Page 1028: ......
Page 1100: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 1074 vtp primary ...
Page 1102: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 1076 Notices ...
Page 1108: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches IN 6 Index ...