Applying rate limiting on racl defined traffic – Brocade Multi-Service IronWare Security Configuration Guide (Supporting R05.6.00) User Manual
Page 166
![background image](/manuals/361632/166/background.png)
148
Multi-Service IronWare Security Configuration Guide
53-1003035-02
IP receive ACLs
3
NOTE
An implicit deny ip any any will be programmed at the end, after all other rACLs. This implicit clause
will always be programmed to drop the matching traffic.
Configuring rACL to apply a defined ACL and establishing the sequence of rACL
commands
To configure rACL to apply ACL number “101” with a sequence number of “15” to all interfaces
within the default VRF for all CPU-bound traffic, enter the following command:
Brocade(config)# ip receive access-list 101 sequence 15
If you are using loopback interfaces for all BGP peering sessions, you can define an ACL that only
permits BGP traffic from a specified source IP address. Where the peer source has an IP address of
10.1.1.1 and the loopback IP address on the device is 10.2.2.2, the access list command is
configured as shown in the following.
Brocade(config)# access-list 106 permit tcp host 10.1.1.1 host 10.2.2.2 eq bgp
The rACL command that implements ACL “106” is configured as shown in the following.
Brocade(config)# ip receive access-list 106 sequence 10
To configure rACL to apply the named ACL “acl_stand1” with a sequence number of “10” to all
interfaces within the default VRF for all CPU-bound traffic, enter the following command:
Brocade(config)# ip receive access-list acl_stand1 sequence 10
Syntax: [no] ip receive access-list {acl-num | acl-name} sequence seq-num
The
{acl-num | acl-name}
variable identifies the ACL (standard or extended) that you want to apply
to all interfaces within the default VRF for all CPU-bound traffic.
The sequence seq-num option defines the sequence in which the rACL commands will be applied.
The valid range is from 1 through 200. Commands are applied in order of the lowest to highest
sequence numbers. For example, if the following rACL commands are entered.
Brocade(config)# ip receive access-list 100 sequence 10
Brocade(config)# ip receive access-list 101 sequence 25
Brocade(config)# ip receive access-list 102 sequence 15
The effective binding of the commands will be in the following order.
ip receive access-list 100 sequence 10
ip receive access-list 102 sequence 15
ip receive access-list 101 sequence 25
Using the [no] option removes the rACL access list defined in the command.
Applying rate limiting on rACL defined traffic
The rACL feature allows you to apply rate limiting to CPU-bound traffic using the policy-map and
strict-acl options of the ip receive access-list command.
To configure rACL to apply the named ACL “acl_stand1” with a policy-map “m1”, enter the following
command.
Brocade
(config)# ip receive access-list acl_stand1 sequence 10 policy-map m1