SUMMARY STEPS
1.
configure terminal
2.
ipv6 snooping policypolicy-name
3.
{[default ] | [device-role {node | switch}] | [limit address-count value] | [no] | [protocol {dhcp | ndp}
] | [security-level {glean | guard | inspect} ] | [tracking {disable [stale-lifetime [seconds | infinite] |
enable [reachable-lifetime [seconds | infinite] } ] | [trusted-port ] }
4.
end
5.
show ipv6 snooping policy policy-name
DETAILED STEPS
PurposeCommand or Action
Enters the global configuration mode.configure terminal
Example:
Switch# configure terminal
Step 1
Creates a snooping policy and enters IPv6 Snooping Policy Configuration
mode.
ipv6 snooping policypolicy-name
Example:
Switch(config)# ipv6 snooping policy
example_policy
Step 2
Enables data address gleaning, validates messages against various criteria,
specifies the security level for messages.
{[default ] | [device-role {node | switch}] |
[limit address-count value] | [no] | [protocol
Step 3
{dhcp | ndp} ] | [security-level {glean | guard
• (Optional) default—Sets all to default options.
| inspect} ] | [tracking {disable [stale-lifetime
[seconds | infinite] | enable
• (Optional) device-role{node] | switch}—Specifies the role of the
device attached to the port. Default is node.
[reachable-lifetime [seconds | infinite] } ] |
[trusted-port ] }
• (Optional) limit address-count value—Limits the number of
addresses allowed per target.
Example:
Switch(config-ipv6-snooping)# security-level
inspect
• (Optional) no—Negates a command or sets it to defaults.
• (Optional) protocol{dhcp | ndp}—Specifies which protocol should
be redirected to the snooping feature for analysis. The default, is dhcp
and ndp. To change the default, use the no protocol command.
Example:
Switch(config-ipv6-snooping)# trusted-port
• (Optional) security-level{glean|guard|inspect}—Specifies the level
of security enforced by the feature. Default is guard.
glean—Gleans addresses from messages and populates the binding
table without any verification.
guard—Gleans addresses and inspects messages. In addition, it
rejects RA and DHCP server messages. This is the default option.
inspect—Gleans addresses, validates messages for consistency
and conformance, and enforces address ownership.
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
OL-29434-01 353
Configuring IPv6 First Hop Security
How to Configure an IPv6 Snooping Policy