hit counter script

How To Attach An Ipv6 Source Guard Policy To An Interface - Cisco Catalyst 2960-XR Security Configuration Manual

Ios release 15.0 2 ex1
Hide thumbs Also See for Catalyst 2960-XR:
Table of Contents

Advertisement

How to Attach an IPv6 Source Guard Policy to an Interface

Command or Action
Step 2
[no] ipv6 source-guard policy policy_name
Example:
Switch(config)#
example_policy
Step 3
[deny global-autoconf] [permit link-local] [default{.
. . }] [exit] [no{. . . }]
Example:
Switch(config-sisf-sourceguard)#
global-autoconf
Step 4
end
Example:
Switch(config-sisf-sourceguard)# end
Step 5
show ipv6 source-guard policy policy_name
Example:
Switch# show ipv6 source-guard policy
example_policy
What to Do Next
Apply the IPv6 Source Guard policy to an interface.
How to Attach an IPv6 Source Guard Policy to an Interface
SUMMARY STEPS
1. configure terminal
2. interface Interface_type stack/module/port
3. ipv6 source-guard attach-policy policy_name
4. do show running-config
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
370
ipv6 source-guard policy
deny
Purpose
Specifies the IPv6 Source Guard policy name and enters IPv6
Source Guard policy configuration mode.
Defines the IPv6 Source Guard policy.
• deny global-autoconf—Denies data traffic from
auto-configured global addresses. This is useful when all
global addresses on a link are DHCP-assigned and the
administrator wants to block hosts with self-configured
addresses to send traffic.
• permit link-local—Allows all data traffic that is sourced
by a link-local address.
Exits to Privileged Exec mode.
Shows the policy configuration and all the interfaces where the
policy is applied.
Configuring IPv6 First Hop Security
OL-29434-01

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents