IPv6 First Hop Security
497
OL-32830-01 Command Line Interface Reference Guide
25
Example
The following example defines an ND Inspection policy named policy1, places the
switch in ND Inspection Policy Configuration mode, and enables the switch to drop
messages with no or invalid options or an invalid signature:
switchxxxxxx(config)#
ipv6 nd inspection policy
policy1
switchxxxxxx(config-nd-inspection)#
drop-unsecure
switchxxxxxx(config-nd-inspection)#
exit
25.12 hop-limit
To enable the verification of the advertised Cur Hop Limit value in RA messages
within an IPv6 RA Guard policy, use the hop-limit command in RA Guard Policy
Configuration mode. To return to the default, use the no form of this command.
Syntax
hop-limit {[maximum {
value
| disable}] [minimum {
value
| disable}]}
no hop-limit [maximum] [minimum]
Parameters
•
maximum
value
—Verifies that the hop-count limit is less than or equal to the
value argument. Range 1-255. The value of the high boundary must be
equal or greater than the value of the low boundary.
•
maximum disable—Disables verification of the high boundary of the
hop-count limit.
•
minimum
value
—Verifies that the hop-count limit is greater than or equal to
the value argument. Range 1-255.
•
minimum disable—Disables verification of the lower boundary of the
hop-count limit.
Default Configuration
Policy attached to port or port channel: the value configured in the policy attached
to the VLAN.
Policy attached to VLAN: global configuration.
Содержание 300 Series
Страница 2: ......