Users Guide

If you choose the all option:
The system applies the RA guard policy to all the VLANs that are associated with this interface.
The system applies the RA guard policy to any new VLANs that you associate with this interface in
the future.
When you apply the RA guard policy to a primary VLAN, the primary VLAN works as a regular VLAN.
The RA packets received on the promiscuous ports flood to all the member ports of the primary and
secondary VLANs.
When you apply the policy to a secondary VLAN, the RA packets received on secondary ports are
flooded to the member ports of the primary VLAN.
NOTE: If the secondary ports are connected to host devices, ensure that you configure the
device role as host using the device-role command.
Examples
OS10(conf-if-eth1/1/1)#ipv6 nd ra-guard attach-policy test vlan all
OS10(conf-if-eth1/1/1)#ipv6 nd ra-guard attach-policy test vlan 1,5
OS10(conf-if-eth1/1/1)#ipv6 nd ra-guard attach-policy test vlan 1-5
Supported
Releases
10.5.2.0 or later
ipv6 nd ra-guard enable
Enables IPv6 RA guard.
Syntax
ipv6 nd ra-guard enable
Parameters None
Default Disabled
Command Mode CONFIGURATION
Usage
Information
This command allows you to configure the IPv6 RA guard feature. The no form of this command disables
IPv6 RA guard.
Example
OS10(config)# ipv6 nd ra-guard enable
Supported
Releases
10.5.2.0 or later
ipv6 nd ra-guard logging enable
Enables console logging for RA guard violation.
Syntax
ipv6 nd ra-guard logging enable
Parameters None
Default Disabled
Command Mode CONFIGURATION
Usage
Information
By default, the system logs the first violating packet for a port-VLAN combination. You can control
further console logging for RA guard violation using this command. The no form of this command disables
console logging.
The logs appear on the console as shown:
2020-01-03T12:44:23.225810+00:00 MAA-S6000-1235 dn_alm 1027 - -
Node.1-Unit.1:PRI [event], Dell EMC (OS10) %RAGUARD_DENIED_RA_PACKET:
908 Layer 3