Purpose
Command or Action
Creates a snooping policy and enters IPv6 Snooping Policy Configuration
mode.
ipv6 snooping policy policy-name
Example:
Switch(config)#
ipv6 snooping policy
example_policy
Step 2
Enables data address gleaning, validates messages against various criteria,
specifies the security level for messages.
{[
default
] | [
device-role
{
node
|
switch
}] |
[
limit address-count value
] | [
no
] | [
protocol
Step 3
{
dhcp
|
ndp
} ] | [
security-level
{
glean
|
guard
•
(Optional)
default
—
Sets all to default options.
|
inspect
} ] | [
tracking
{
disable
[
stale-lifetime
[
seconds
|
infinite
] |
enable
•
(Optional)
device-role
{
node
] |
switch
}
—
Specifies the role of the
device attached to the port. Default is
node
.
[
reachable-lifetime
[
seconds
|
infinite
] } ] |
[
trusted-port
] }
•
(Optional)
limit address-count value
—
Limits the number of
addresses allowed per target.
Example:
Switch(config-ipv6-snooping)# security-level
inspect
•
(Optional)
no
—
Negates a command or sets it to defaults.
•
(Optional)
protocol
{
dhcp
|
ndp
}
—
Specifies which protocol should
be redirected to the snooping feature for analysis. The default, is
dhcp
and
ndp
. To change the default, use the
no protocol
command.
Example:
Switch(config-ipv6-snooping)# trusted-port
•
(Optional)
security-level
{
glean
|
guard
|
inspect
}
—
Specifies the level
of security enforced by the feature. Default is
guard.
glean
—
Gleans addresses from messages and populates the binding
table without any verification.
guard
—
Gleans addresses and inspects messages. In addition, it
rejects RA and DHCP server messages. This is the default option.
inspect
—
Gleans addresses, validates messages for consistency
and conformance, and enforces address ownership.
•
(Optional)
tracking
{
disable
|
enable
}
—
Overrides the default
tracking behavior and specifies a tracking option.
•
(Optional)
trusted-port
—
Sets up a trusted port. It disables the guard
on applicable targets. Bindings learned through a trusted port have
preference over bindings learned through any other port. A trusted
port is given preference in case of a collision while making an entry
in the table.
Exits configuration modes to Privileged EXEC mode.
end
Example:
Switch(config-ipv6-snooping)#
exit
Step 4
Displays the snooping policy configuration.
show ipv6 snooping policy policy-name
Example:
Switch#
show ipv6 snooping policy
example_policy
Step 5
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01
443
Configuring IPv6 First Hop Security
How to Configure an IPv6 Snooping Policy