Configuring and applying an RA guard policy

Configure an RA guard policy if you do not specify a role for the attached device or if you want to filter the RA messages sent by a router.

To configure and apply an RA guard policy:

Step

Command

Remarks

1. Enter system view.

system-view

N/A

2. Create an RA guard policy and enter its view.

ipv6 nd raguard policy policy-name

By default, no RA guard policies exist.

3. Specify an ACL match criterion.

if-match acl { ipv6-acl-number | name ipv6-acl-name }

By default, no ACL match criterion exists.

4. Specify a prefix match criterion.

if-match prefix acl { ipv6-acl-number | name ipv6-acl-name }

By default, no prefix match criterion exists.

5. Specify a router preference match criterion.

if-match router-preference maximum { high | low | medium }

By default, no router preference match criterion exists.

6. Specify an M flag match criterion.

if-match autoconfig managed-address-flag { off | on }

By default, no M flag match criterion exists.

7. Specify an O flag match criterion.

if-match autoconfig other-flag { off | on }

By default, no O flag match criterion exists.

8. Specify a maximum or minimum hop limit match criterion.

if-match hop-limit { maximum | minimum } limit

By default, no hop limit match criterion exists.

9. Quit RA guard policy view.

quit

N/A

10. Enter VLAN view.

vlan vlan-number

N/A

11. Apply an RA guard policy to the VLAN.

ipv6 nd raguard apply policy [ policy-name ]

By default, no RA guard policy is applied to the VLAN.