Purpose
Command or Action
•
server
—
Specifies that the attached device is a DHCP
server. Server messages are allowed on this port.
(Optional)
trusted-port
—
Sets the port to a trusted mode. No
further policing takes place on the port.
trusted-port
Example:
Switch(config-dhcp-guard)#
trusted-port
Step 4
If you configure a trusted port then the device-role
option is not available.
Note
(Optional)
default
—
Sets a command to its defaults.
default
{
device-role
|
trusted-port
}
Example:
Switch(config-dhcp-guard)#
default
device-role
Step 5
(Optional)
no
—
Removes the configured policy parameters.
no
{
device-role
|
trusted-port
}
Example:
Switch(config-dhcp-guard)#
no trusted-port
Step 6
(Optional) Displays the configuration of the IPv6 DHCP guard
policy without leaving the configuration submode.
do show ipv6 dhcp guard policy policy_name
Example:
Switch(config-dhcp-guard)#
do show ipv6 dhcp
guard policy example_policy
Step 7
How to Attach an IPv6 DHCP Guard Policy to an Interface
Beginning in privileged EXEC mode, follow these steps to configure IPv6 Binding Table Content :
SUMMARY STEPS
1.
configure terminal
2.
interface
Interface_type
stack/module/port
3.
ipv6 dhcp guard
[
attach-policy policy_name
[
vlan
{
vlan_ids
|
add vlan_ids
|
except vlan_ids
|
none
|
remove vlan_ids
|
all
} ] |
vlan
[ {
vlan_id
s |
add vlan_ids
|
exceptvlan_ids
|
none
|
remove vlan_ids
|
all
} ]
4.
do show running-config
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
OL-29434-01
367
Configuring IPv6 First Hop Security
How to Attach an IPv6 DHCP Guard Policy to an Interface