EasyManuals Logo
Home>Cisco>Switch>Catalyst 3650 Series

Cisco Catalyst 3650 Series User Manual

Cisco Catalyst 3650 Series
1108 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #801 background imageLoading...
Page #801 background image
ipv6 snooping policy
All existing IPv6 Snooping commands (prior to Cisco IOS XE Denali 16.1.1) now have corresponding
SISF-based device-tracking commands that allow you to apply your configuration to both IPv4 and IPv6
address families. For more information, seedevice-tracking policy
Note
To configure an IPv6 snooping policy and enter IPv6 snooping configuration mode, use the ipv6 snooping
policy command in global configuration mode. To delete an IPv6 snooping policy, use the no form of this
command.
ipv6 snooping policy snooping-policy
no ipv6 snooping policy snooping-policy
Syntax Description
User-defined name of the snooping policy. The policy name can be a symbolic
string (such as Engineering) or an integer (such as 0).
snooping-policy
Command Default
An IPv6 snooping policy is not configured.
Command Modes
Global configuration
Command History
ModificationRelease
This command was introduced.Cisco IOS XE 3.3SECisco IOS XE 3.3SE
Usage Guidelines
Use the ipv6 snooping policy command to create an IPv6 snooping policy. When the ipv6 snooping policy
command is enabled, the configuration mode changes to IPv6 snooping configuration mode. In this mode,
the administrator can configure the following IPv6 first-hop security commands:
•
The device-role command specifies the role of the device attached to the port.
•
The limit address-count maximum command limits the number of IPv6 addresses allowed to be used
on the port.
•
The protocol command specifies that addresses should be gleaned with Dynamic Host Configuration
Protocol (DHCP) or Neighbor Discovery Protocol (NDP).
•
The security-level command specifies the level of security enforced.
•
The tracking command overrides the default tracking policy on a port.
•
The trusted-port command configures a port to become a trusted port; that is, limited or no verification
is performed when messages are received.
Command Reference, Cisco IOS XE Everest 16.5.1a (Catalyst 3650 Switches)
775
ipv6 snooping policy

Table of Contents

Other manuals for Cisco Catalyst 3650 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3650 Series and is the answer not in the manual?

Cisco Catalyst 3650 Series Specifications

General IconGeneral
BrandCisco
ModelCatalyst 3650 Series
CategorySwitch
LanguageEnglish

Related product manuals