Purpose
Command or Action
Specifies the role of the device attached to the
port. The default is
host
.
device-role
{
host
|
monitor
|
router
|
switch
}
Example:
Switch(config-nd-inspection)#
device-role switch
Step 3
Drops messages with no or invalid options or an
invalid signature.
drop-unsecure
Example:
Switch(config-nd-inspection)#
drop-unsecure
Step 4
Enter 1
–
10,000.
limit address-count value
Example:
Switch(config-nd-inspection)#
limit address-count 1000
Step 5
Specifies the minimum security level parameter
value when Cryptographically Generated Address
(CGA) options are used.
sec-level minimum value
Example:
Switch(config-nd-inspection)#
limit address-count 1000
Step 6
Overrides the default tracking policy on a port.
tracking
{
enable
[
reachable-lifetime
{
value
|
infinite
}] |
disable
[
stale-lifetime
{
value
|
infinite
}]}
Step 7
Example:
Switch(config-nd-inspection)#
tracking disable
stale-lifetime infinite
Configures a port to become a trusted port.
trusted-port
Example:
Switch(config-nd-inspection)#
trusted-port
Step 8
validate source-mac
Step 9
Example:
Switch(config-nd-inspection)#
validate source-mac
Remove the current configuration of a parameter
with the
no
form of the command.
no
{
device-role
|
drop-unsecure
|
limit address-count
|
sec-level
minimum
|
tracking
|
trusted-port
|
validate source-mac
}
Example:
Switch(config-nd-inspection)#
no validate source-mac
Step 10
Restores configuration to the default values.
default
{
device-role
|
drop-unsecure
|
limit address-count
|
sec-level minimum
|
tracking
|
trusted-port
|
validate
source-mac
}
Step 11
Example:
Switch(config-nd-inspection)#
default limit
address-count
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
OL-29434-01
359
Configuring IPv6 First Hop Security
How to Configure an IPv6 Neighbor Discovery Inspection Policy