EasyManuals Logo

Cisco Catalyst 2960-XR User Manual

Cisco Catalyst 2960-XR
404 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #375 background imageLoading...
Page #375 background image
SUMMARY STEPS
1.
configure terminal
2.
ipv6 snooping policypolicy-name
3.
{[default ] | [device-role {node | switch}] | [limit address-count value] | [no] | [protocol {dhcp | ndp}
] | [security-level {glean | guard | inspect} ] | [tracking {disable [stale-lifetime [seconds | infinite] |
enable [reachable-lifetime [seconds | infinite] } ] | [trusted-port ] }
4.
end
5.
show ipv6 snooping policy policy-name
DETAILED STEPS
PurposeCommand or Action
Enters the global configuration mode.configure terminal
Example:
Switch# configure terminal
Step 1
Creates a snooping policy and enters IPv6 Snooping Policy Configuration
mode.
ipv6 snooping policypolicy-name
Example:
Switch(config)# ipv6 snooping policy
example_policy
Step 2
Enables data address gleaning, validates messages against various criteria,
specifies the security level for messages.
{[default ] | [device-role {node | switch}] |
[limit address-count value] | [no] | [protocol
Step 3
{dhcp | ndp} ] | [security-level {glean | guard
(Optional) defaultSets all to default options.
| inspect} ] | [tracking {disable [stale-lifetime
[seconds | infinite] | enable
(Optional) device-role{node] | switch}Specifies the role of the
device attached to the port. Default is node.
[reachable-lifetime [seconds | infinite] } ] |
[trusted-port ] }
(Optional) limit address-count valueLimits the number of
addresses allowed per target.
Example:
Switch(config-ipv6-snooping)# security-level
inspect
(Optional) noNegates a command or sets it to defaults.
(Optional) protocol{dhcp | ndp}Specifies which protocol should
be redirected to the snooping feature for analysis. The default, is dhcp
and ndp. To change the default, use the no protocol command.
Example:
Switch(config-ipv6-snooping)# trusted-port
(Optional) security-level{glean|guard|inspect}Specifies the level
of security enforced by the feature. Default is guard.
gleanGleans addresses from messages and populates the binding
table without any verification.
guardGleans addresses and inspects messages. In addition, it
rejects RA and DHCP server messages. This is the default option.
inspectGleans addresses, validates messages for consistency
and conformance, and enforces address ownership.
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
OL-29434-01 353
Configuring IPv6 First Hop Security
How to Configure an IPv6 Snooping Policy

Table of Contents

Other manuals for Cisco Catalyst 2960-XR

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 2960-XR and is the answer not in the manual?

Cisco Catalyst 2960-XR Specifications

General IconGeneral
Stacking Bandwidth80 Gbps
Layer SupportLayer 2 and Layer 3
Jumbo Frame Support9198 bytes
RAM512 MB
Input Voltage100-240V AC
ModelCatalyst 2960-XR
Uplink Interfaces4 x 1G SFP or 2 x 10G SFP+
Downlink Interfaces24 or 48 x Gigabit Ethernet ports
Power SupplyInternal
MAC Address Table Size16, 000 entries
PoEAvailable on PoE models
Weight4.5 kg
Featuresenergy efficiency
StackingUp to 8 switches
Operating Temperature0 to 45°C

Related product manuals