
Chapter 27
| IP Interface Commands
ND Snooping
– 782 –
packet to the target host. If it receives an NA packet in response, it knows that the
target still exists and updates the lifetime of the binding; otherwise, it deletes the
binding.
This section describes commands used to configure ND Snooping.
ipv6 nd snooping
This command enables ND snooping globally or on a specified VLAN or range of
VLANs. Use the
no
form to disable this feature.
Syntax
[
no
]
ipv6 nd snooping
[
vlan
{
vlan-id
|
vlan-range
}]
vlan-id
- VLAN ID. (Range: 1-4094)
vlan-range
- A consecutive range of VLANs indicated by the use a hyphen,
or a random group of VLANs with each entry separated by a comma.
Default Setting
Disabled
Table 159: ND Snooping Commands
Command
Function
Mode
Enables ND snooping globally or on a specified VLAN or
range of VLANs
GC
Enables automatic validation of binding table entries by
periodically sending NS messages and awaiting NA
replies
GC
ipv6 nd snooping auto-detect
retransmit count
Sets the number of times to send an NS message to
determine if a binding is still valid
GC
ipv6 nd snooping auto-detect
retransmit interval
Sets the interval between sending NS messages to
determine if a binding is still valid
GC
ipv6 nd snooping prefix
timeout
Sets the time to wait for an RA message before deleting
an entry in the prefix table
GC
Sets the maximum number of address entries which can
be bound to a port
IC
Configures a port as a trusted interface from which prefix
information in RA messages can be added to the prefix
table, or NS messages can be forwarded without
validation
IC
clear ipv6 nd snooping
binding
Clears all entries in the address binding table
PE
Clears all entries in the prefix table
PE
Shows configuration settings for ND snooping
PE
Shows entries in the binding table
PE
Show entries in the prefix table
PE
Summary of Contents for AS5700-54X
Page 42: ...Contents 42...
Page 44: ...Figures 44...
Page 52: ...Tables 52...
Page 54: ...Section I Getting Started 54...
Page 80: ...Chapter 1 Initial Switch Configuration Setting the System Clock 80...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 358: ...Chapter 9 Access Control Lists ACL Information 358...
Page 418: ...Chapter 12 Port Mirroring Commands RSPAN Mirroring Commands 418...
Page 436: ...Chapter 15 UniDirectional Link Detection Commands 436...
Page 442: ...Chapter 16 Address Table Commands 442...
Page 506: ...Chapter 18 VLAN Commands Configuring VXLAN Tunneling 506...
Page 526: ...Chapter 19 Class of Service Commands Priority Commands Layer 3 and 4 526...
Page 544: ...Chapter 20 Quality of Service Commands 544...
Page 652: ...Chapter 22 Multicast Filtering Commands MLD Proxy Routing 652...
Page 680: ...Chapter 23 LLDP Commands 680...
Page 722: ...Chapter 24 CFM Commands Delay Measure Operations 722...
Page 732: ...Chapter 25 Domain Name Service Commands 732...
Page 790: ...Chapter 27 IP Interface Commands ND Snooping 790...
Page 1072: ...Section III Appendices 1072...
Page 1102: ...List of CLI Commands 1102...
Page 1115: ......
Page 1116: ...AS5700 54X AS6700 32X E032016 ST R02 149100000198A...