PurposeCommand or Action
Specifies the ND inspection policy name and enters
ND Inspection Policy configuration mode.
[no]ipv6 nd inspection policy policy-name
Example:
Switch(config)# ipv6 nd inspection policy
example_policy
Step 2
Specifies the role of the device attached to the port.
The default is host.
device-role {host | monitor | router | switch}
Example:
Switch(config-nd-inspection)# device-role switch
Step 3
Drops messages with no or invalid options or an
invalid signature.
drop-unsecure
Example:
Switch(config-nd-inspection)# drop-unsecure
Step 4
Enter 1–10,000.
limit address-count value
Example:
Switch(config-nd-inspection)# limit address-count 1000
Step 5
Specifies the minimum security level parameter
value when Cryptographically Generated Address
(CGA) options are used.
sec-level minimum value
Example:
Switch(config-nd-inspection)# limit address-count 1000
Step 6
Overrides the default tracking policy on a port.
tracking {enable [reachable-lifetime {value | infinite}] |
disable [stale-lifetime {value | infinite}]}
Step 7
Example:
Switch(config-nd-inspection)# tracking disable
stale-lifetime infinite
Configures a port to become a trusted port.trusted-port
Example:
Switch(config-nd-inspection)# trusted-port
Step 8
Checks the source media access control (MAC)
address against the link-layer address.
validate source-mac
Example:
Switch(config-nd-inspection)# validate source-mac
Step 9
Remove the current configuration of a parameter
with the no form of the command.
no {device-role | drop-unsecure | limit address-count |
sec-level minimum | tracking | trusted-port | validate
source-mac}
Step 10
Example:
Switch(config-nd-inspection)# no validate source-mac
Restores configuration to the default values.default {device-role | drop-unsecure | limit address-count |
sec-level minimum | tracking | trusted-port | validate
source-mac}
Step 11
Consolidated Platform Configuration Guide, Cisco IOS Release 15.2(4)E (Catalyst 2960-X Switches)
688
How to Configure an IPv6 Neighbor Discovery Inspection Policy