EasyManua.ls Logo

HP A5500 EI - Ipv6 Nd Detection Trust

HP A5500 EI
354 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
334
Default level
2: System level
Parameters
None
Description
Use the ipv6 nd detection enable command to enable ND detection in a VLAN to check ND packets for
source spoofing.
Use the undo ipv6 nd detection enable command to disable ND detection.
By default, ND detection is disabled.
Examples
# Enable ND detection in VLAN 10.
<Sysname> system-view
[Sysname] vlan 10
[Sysname-vlan 10] ipv6 nd detection enable
ipv6 nd detection trust
Syntax
ipv6 nd detection trust
undo ipv6 nd detection trust
View
Layer 2 Ethernet interface view, Layer 2 aggregate interface view
Default level
2: System level
Parameters
None
Description
Use the ipv6 nd detection trust command to configure a port as an ND-trusted port.
Use the undo ipv6 nd detection trust command to configure a port as an ND-untrusted port.
By default, a port is ND-untrusted. In an ND detection-enabled VLAN, ports are assigned two roles: ND-
trusted and ND-untrusted.
On an ND-trusted port, the ND detection function does not check ND packets for address spoofing.
On an ND-untrusted port, RA and RR messages are considered illegal and discarded directly; all
other ND packets in the VLAN are checked for source spoofing.
Examples
# Configure Layer 2 interface GigabitEthernet1/0/1 as an ND-trusted port.
<Sysname> system-view
[Sysname] interface GigabitEthernet 1/0/1
[Sysname-GigabitEthernet1/0/1] ipv6 nd detection trust
# Configure interface Bridge-Aggregation 1 as an ND-trusted port.

Table of Contents

Related product manuals