EasyManuals Logo

Cisco Catalyst 3560-X User Manual

Cisco Catalyst 3560-X
1538 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1175 background imageLoading...
Page #1175 background image
1-21
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
OL-25303-03
Chapter 1 Configuring IPv6 Unicast Routing
Configuring IPv6
To attach a snooping policy to an interface or VLAN, complete the following steps:
Configuring IPv6 DHCP Guard
Action or Command Purpose
Step 1
enable Enables privileged EXEC mode. Enter your password if prompted.
Step 2
configure terminal Enters the global configuration mode.
Step 3
interface type number Specifies an interface type and number, and enters the interface
configuration mode.
Step 4
switchport
ipv6 snooping attach-policy
policy-name
OR
vlan configuration vlan list
ipv6 snooping attach-policy
policy-name
Attaches the snooping policy (where data gleaning is enabled) to an
interface. Specifies the port and the policy that is attached to the port.
Note If you have enabled data-glean on a snooping policy, you must
attach it to an interface and not a VLAN.
Step 5
show ipv6 snooping policy policy-name Displays the snooping policy configuration.
Step 6
show ipv6 neighbors binding Displays the binding table entries populated by the snooping policy.
Action or Command Purpose
Step 1
enable Enables privileged EXEC mode. Enter your password if prompted.
Step 2
configure terminal Enters the global configuration mode.
Step 3
ipv6 dhcp guard policy policy-name Creates a policy in global configuration mode and enters the DHCP guard
policy global configuration mode.
Step 4
[default | device-role [client | server] | no
| exit | trusted-port]
Configures the parameters for the DHCP guard policy.
(Optional) default—Set a command to its defaults.
(Optional) device-role [client | server]—Qualifies the role of the
device attached to the port.
client—Specifies that the attached device is a client. This is the
default. Any server messages are dropped on this port.
server—Specifies that the attached device is a DHCP server.
Server messages are allowed on this port.
(Optional) no—Removes the configured policy parameters.
(Optional) exit—Exits the DHCP guard policy global configuration
mode.
(Optional) trusted-port—Sets the port to a trusted mode. No further
policing takes place on the port.
Note If you configure a trusted port then the device-role option is
not available.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3560-X and is the answer not in the manual?

Cisco Catalyst 3560-X Specifications

General IconGeneral
Enclosure TypeRack-mountable - 1U
SubtypeGigabit Ethernet
Ports48 x 10/100/1000 + 4 x SFP
Flash Memory64 MB
Power DeviceInternal power supply
Voltage RequiredAC 120/230 V (50/60 Hz)
Operating SystemCisco IOS
Device TypeSwitch
PerformanceSwitching capacity: 128 Gbps
Jumbo Frame SupportYes
Routing ProtocolRIP-1, RIP-2, EIGRP
Remote Management ProtocolSNMP 1, RMON 1, RMON 2, RMON 3, RMON 9, Telnet, SNMP 3, HTTP, HTTPS
FeaturesDHCP support, VLAN support, QoS, IPv6 support, Syslog
Compliant StandardsIEEE 802.3, IEEE 802.3u, IEEE 802.3z, IEEE 802.1D, IEEE 802.1Q, IEEE 802.3ab, IEEE 802.1p, IEEE 802.3af, IEEE 802.3x, IEEE 802.3ad, IEEE 802.1w, IEEE 802.1x, IEEE 802.1s, IEEE 802.3ah, IEEE 802.1ag, IEEE 802.3at
StackingStackable
Security FeaturesSSH, RADIUS, TACACS+
ManagementCLI
Dimensions (H x W x D)17.5 in
Operating Temperature32 to 113 °F (0 to 45 °C)
Humidity10 - 95% (non-condensing)

Related product manuals