What to Do Next
Attach an IPv6 Snooping policy to interfaces or VLANs.
How to Attach an IPv6 Snooping Policy to an Interface
Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Snooping policy on an interface or
VLAN:
SUMMARY STEPS
1.
configure terminal
2.
interface
Interface_type
stack/module/port
3.
switchport
4.
ipv6 snooping
[
attach-policy policy_name
[
vlan
{
vlan_id
|
add vlan_ids
|
exceptvlan_ids
|
none
|
remove vlan_ids
}] |
vlan
{
vlan_id
|
add vlan_ids
|
exceptvlan_ids
|
none
|
remove vlan_ids
|
all
} ]
5.
do show running-config
DETAILED STEPS
Purpose
Command or Action
Enters the global configuration mode.
configure terminal
Example:
Switch#
configure terminal
Step 1
Specifies an interface type and identifier; enters the interface
configuration mode.
interface
Interface_type
stack/module/port
Example:
Switch(config)#
interface gigabitethernet
1/1/4
Step 2
Enters the Switchport mode.
switchport
Step 3
Example:
Switch(config-if)#
switchport
To configure Layer 2 parameters, if the interface is in Layer
3 mode, you must enter the switchport interface configuration
command without any parameters to put the interface into
Layer 2 mode. This shuts down the interface and then
re-enables it, which might generate messages on the device
to which the interface is connected. When you put an interface
that is in Layer 3 mode into Layer 2 mode, the previous
configuration information related to the affected interface
might be lost, and the interface is returned to its default
configuration. The command prompt displays as (config-if)#
in Switchport configuration mode.
Note
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
444
OL-29048-01
Configuring IPv6 First Hop Security
How to Attach an IPv6 Snooping Policy to an Interface