Users Guide

Table Of Contents
-----------------------------------------------------------------
C 2001:db86::/32 via 2001:db86:fff::1 ethernet1/1/1 0/0 00:03:24
View IPv6 static information
OS10# show ipv6 route static
Codes: C - connected
S - static
B - BGP, IN - internal BGP, EX - external BGP
O - OSPF,IA - OSPF inter area, N1 - OSPF NSSA external type 1,
N2 - OSPF NSSA external type 2, E1 - OSPF external type 1,
E2 - OSPF external type 2, > - non-active route
Gateway of last resort is not set
Destination Gateway Dist/Metric Last Change
------------------------------------------------------------------
S 2111:dddd:eee::22/12via 2001:db86:fff::2 ethernet1/1/1 1/1 00:01:24
IPv6 RA Guard
The IPv6 Router Advertisement (RA) guard feature prevents the OS10 switch from receiving unwanted and rouge RA messages
from its neighbor devices. RA guard inspects and validates the RA messages against the policy that you configured. Depending
on the validation result, RA guard forwards or drops the packets that match the policy conditions.
This feature is applicable only for an environment where all messages between IPv6 end devices traverse through an RA
guard-enabled Layer 2 (L2) switch. This feature is not supported if the end devices communicate directly without an RA
guard-capable L2 device.
Limitations
RA guard validation is not applicable for IPv6-tunneled RA packets.
This feature is supported only in the ingress direction and not supported at egress.
OS10 does not validate IPv6 unicast RA packets that include extension headers and IPv6 unicast RA fragmented packets.
Configuration notes
If you enable the IPv6 RA guard and port security feature on the same interface, ensure that you do not use the flood
option.
IPv6 RA guard policy takes precedence over the Access Control List (ACL) that is applied on the interface.
Configure IPv6 RA guard
This section describes how to configure IPv6 RA guard.
Enable the IPv6 RA guard feature globally. Create a policy and specify a list of parameters to validate against the contents of
the RA guard packets. Apply the policy to the specific interfaces.
1. Enable IPv6 RA guard.
OS10(config)# ipv6 nd ra-guard enable
2. Create an IPv6 RA guard policy.
OS10(config)# ipv6 nd ra-guard policy ra-guard-test-policy
3. Configure the device role to apply the IPv6 RA guard policy to an interface.
OS10(conf-ra_guard_policy_list)# device-role router
4. If this command is set to off, the system verifies the advertised managed configuration parameter is set to off in the RA
packet and the other way round.
Layer 3
911