
Chapter 8
| General Security Measures
IPv6 Source Guard
– 310 –
IPv6 Source Guard
IPv6 Source Guard is a security feature that filters IPv6 traffic on non-routed, Layer 2
network interfaces based on manually configured entries in the IPv6 Source Guard
table, or dynamic entries in the Neighbor Discovery Snooping table or DHCPv6
Snooping table when either snooping protocol is enabled (see
). IPv6 source guard can be used to prevent traffic attacks caused when
a host tries to use the IPv6 address of a neighbor to access the network. This section
describes commands used to configure IPv6 Source Guard.
ipv6 source-guard
binding
This command adds a static address to the source-guard binding table. Use the
no
form to remove a static entry.
Syntax
ipv6 source-guard binding
mac-address
vlan
vlan-id ipv6-address
interface
interface
no
ipv6 source-guard
binding
mac-address
vlan
vlan-id
mac-address
- A valid unicast MAC address.
vlan-id
- ID of a configured VLAN (Range: 1-4094)
ipv6-address
- Corresponding IPv6 address. This address must be entered
according to RFC 2373 “IPv6 Addressing Architecture,” using 8 colon-
separated 16-bit hexadecimal values. One double colon may be used in the
address to indicate the appropriate number of zeros required to fill the
undefined fields.
interface
ethernet
unit
/
port
unit
- Unit identifier. (Range: 1)
port
- Port number. (Range: 1-32/54)
Table 58: IPv6 Source Guard Commands
Command
Function
Mode
Adds a static address to the source-guard binding table
GC
Configures the switch to filter inbound traffic based on
source IP address
IC
Sets the maximum number of entries that can be bound
to an interface
IC
Shows whether source guard is enabled or disabled on
each interface
PE
show ipv6 source-guard
binding
Shows the source guard binding table
PE
Summary of Contents for AS5700-54X
Page 42: ...Contents 42...
Page 44: ...Figures 44...
Page 52: ...Tables 52...
Page 54: ...Section I Getting Started 54...
Page 80: ...Chapter 1 Initial Switch Configuration Setting the System Clock 80...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 358: ...Chapter 9 Access Control Lists ACL Information 358...
Page 418: ...Chapter 12 Port Mirroring Commands RSPAN Mirroring Commands 418...
Page 436: ...Chapter 15 UniDirectional Link Detection Commands 436...
Page 442: ...Chapter 16 Address Table Commands 442...
Page 506: ...Chapter 18 VLAN Commands Configuring VXLAN Tunneling 506...
Page 526: ...Chapter 19 Class of Service Commands Priority Commands Layer 3 and 4 526...
Page 544: ...Chapter 20 Quality of Service Commands 544...
Page 652: ...Chapter 22 Multicast Filtering Commands MLD Proxy Routing 652...
Page 680: ...Chapter 23 LLDP Commands 680...
Page 722: ...Chapter 24 CFM Commands Delay Measure Operations 722...
Page 732: ...Chapter 25 Domain Name Service Commands 732...
Page 790: ...Chapter 27 IP Interface Commands ND Snooping 790...
Page 1072: ...Section III Appendices 1072...
Page 1102: ...List of CLI Commands 1102...
Page 1115: ......
Page 1116: ...AS5700 54X AS6700 32X E032016 ST R02 149100000198A...