Trusted-Port - Cisco Catalyst 3650 series Command Reference Manual

Cisco ios xe everest 16.5.1a
Hide thumbs Also See for Catalyst 3650 series:
Table of Contents

Advertisement

trusted-port

trusted-port
To configure a port to become a trusted port, use the trusted-port command in IPv6 snooping policy mode
or ND inspection policy configuration mode. To disable this function, use the no form of this command.
trusted-port
no trusted-port
Syntax Description
This command has no arguments or keywords.
Command Default
No ports are trusted.
Command Modes
ND inspection policy configuration
IPv6 snooping configuration
Command History
Release
Cisco IOS XE 3.3SECisco IOS XE 3.3SE
Usage Guidelines
When the trusted-port command is enabled, limited or no verification is performed when messages are
received on ports that have this policy. However, to protect against address spoofing, messages are analyzed
so that the binding information that they carry can be used to maintain the binding table. Bindings discovered
from these ports will be considered more trustworthy than bindings received from ports that are not configured
to be trusted.
Examples
This example shows how to define an NDP policy name as policy1, place the switch in NDP inspection policy
configuration mode, and configure the port to be trusted:
Device(config)# ipv6
Device(config-nd-inspection)# trusted-port
This example shows how to define an IPv6 snooping policy name as policy1, place the switch in IPv6 snooping
policy configuration mode, and configure the port to be trusted:
Device(config)# ipv6 snooping policy policy1
Device(config-ipv6-snooping)# trusted-port
Command Reference, Cisco IOS XE Everest 16.5.1a (Catalyst 3650 Switches)
842
nd inspection
policy1
Modification
This command was introduced.

Advertisement

Table of Contents
loading

Table of Contents