How to Attach an IPv6 Snooping Policy to an Interface
What to Do Next
Attach an IPv6 Snooping policy to interfaces or VLANs.
How to Attach an IPv6 Snooping Policy to an Interface
Beginning in privileged EXEC mode, follow these steps to attach an IPv6 Snooping policy on an interface or
VLAN:
SUMMARY STEPS
1. configure terminal
2. interface Interface_type stack/module/port
3. switchport
4. ipv6 snooping [attach-policy policy_name [ vlan {vlan_id | add vlan_ids | exceptvlan_ids | none |
remove vlan_ids}] | vlan {vlan_id | add vlan_ids | exceptvlan_ids | none | remove vlan_ids | all} ]
5. do show running-config
DETAILED STEPS
Command or Action
Step 1
configure terminal
Example:
Switch# configure terminal
Step 2
interface Interface_type stack/module/port
Example:
Switch(config)# interface gigabitethernet
1/1/4
Step 3
switchport
Example:
Switch(config-if)# switchport
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
444
Purpose
Enters the global configuration mode.
Specifies an interface type and identifier; enters the interface
configuration mode.
Enters the Switchport mode.
To configure Layer 2 parameters, if the interface is in Layer
Note
3 mode, you must enter the switchport interface configuration
command without any parameters to put the interface into
Layer 2 mode. This shuts down the interface and then
re-enables it, which might generate messages on the device
to which the interface is connected. When you put an interface
that is in Layer 3 mode into Layer 2 mode, the previous
configuration information related to the affected interface
might be lost, and the interface is returned to its default
configuration. The command prompt displays as (config-if)#
in Switchport configuration mode.
Configuring IPv6 First Hop Security
OL-29048-01