Difference between revisions of "First-hop security IPv6 Cisco IOS"
From Teknologisk videncenter
m (→Links) |
m (→IPv6 RA Guard) |
||
Line 4: | Line 4: | ||
IPv6 RA guard provides support for allowing the network administrator to block or reject unwanted or rogue RA guard messages that arrive at the network switch platform. RAs are used by routers to announce themselves on the link. | IPv6 RA guard provides support for allowing the network administrator to block or reject unwanted or rogue RA guard messages that arrive at the network switch platform. RAs are used by routers to announce themselves on the link. | ||
− | + | ==RA Guard on Routers== | |
− | ==From IOS 12.2(33)SXI4 to 12.2(54)SG== | + | ===From IOS 12.2(33)SXI4 to 12.2(54)SG=== |
<source lang=cli> | <source lang=cli> | ||
R1(config)#<input>int fa0/1</input> | R1(config)#<input>int fa0/1</input> | ||
R1(config-if)<input>ipv6 nd raguard</input> | R1(config-if)<input>ipv6 nd raguard</input> | ||
</source> | </source> | ||
− | ==From IOS 12.2(54)SG== | + | ===From IOS 12.2(54)SG=== |
<source lang=cli> | <source lang=cli> | ||
R1(config)#<input>int fa0/1</input> | R1(config)#<input>int fa0/1</input> | ||
R1(config-if)<input>ipv6 nd raguard policy policy1</input> | R1(config-if)<input>ipv6 nd raguard policy policy1</input> | ||
R1(config-ra-guard)# | R1(config-ra-guard)# | ||
+ | </source> | ||
+ | ==RA Guard on switches== | ||
+ | <source lang=cli> | ||
+ | SW1(config)#<input>ipv6 access-list BlockRA</input> | ||
+ | SW1(config-acl)#<input>deny icmp any any router-advertisement</input> | ||
+ | SW1(config-acl)#<input>permit ipv6 any any</input> | ||
+ | SW1(config-acl)#<input>exit</input> | ||
+ | SW1(config)#<input>interface range GigabitEthernet0/1 - 24</input> | ||
+ | SW1(config)#<input>ipv6 traffic-filter BlockRA in</input> | ||
</source> | </source> | ||
Revision as of 08:09, 19 December 2011
IPv6 RA Guard
IPv6 Router Advertisement Guard. [1]
IPv6 RA guard provides support for allowing the network administrator to block or reject unwanted or rogue RA guard messages that arrive at the network switch platform. RAs are used by routers to announce themselves on the link.
RA Guard on Routers
From IOS 12.2(33)SXI4 to 12.2(54)SG
R1(config)#<input>int fa0/1</input>
R1(config-if)<input>ipv6 nd raguard</input>
From IOS 12.2(54)SG
R1(config)#<input>int fa0/1</input>
R1(config-if)<input>ipv6 nd raguard policy policy1</input>
R1(config-ra-guard)#
RA Guard on switches
SW1(config)#<input>ipv6 access-list BlockRA</input>
SW1(config-acl)#<input>deny icmp any any router-advertisement</input>
SW1(config-acl)#<input>permit ipv6 any any</input>
SW1(config-acl)#<input>exit</input>
SW1(config)#<input>interface range GigabitEthernet0/1 - 24</input>
SW1(config)#<input>ipv6 traffic-filter BlockRA in</input>
Unicast Reverse Path Forwarding
To avoid spoofed packets passing a Router. Could be DoS attack. With RPF - reverse Path Forwarding - the router checks that the sending hosts source IP address matches the routing table on the receiving interface.
- Example
- An access-list can be used as an option to this command
R1(config)#<input>interface fa0/1</input>
R1(config-if)#<input>ipv6 verify unicast reverse-path</input>