Ip receive access-list – Brocade Multi-Service IronWare Security Configuration Guide (Supporting R05.6.00) User Manual
Page 181
Multi-Service IronWare Security Configuration Guide
163
53-1003035-02
ip receive access-list
3
ip receive access-list
Configures an IPv4 access-control list as an IPv4 receive access-control list (rACL).
The no form of the basic command removes the rACL.
The no form of the command with the policy-map option specified removes both the policy-map
and the strict-acl option: the rACL remains.
The no form of the command with both policy-map and strict-acl options specified, removes the
strict-acl option: the rACL with policy-map remains and traffic matching “deny” clauses starts
passing to the CPU.
Syntax
ip receive access-list {acl-num | acl-name} sequence seq-num [policy-map policy-map-name
[strict-ac l]]
no ip receive access-list {acl-num| acl-name} sequence seq-num [policy-map policy-map-name
[strict-acl]]
Command
Default
By default, traffic matching the “permit” clause in the specified IPv4 ACL is permitted and traffic
matching the “deny” clause in the specified IPv4 ACL is dropped in the hardware.
Parameters
acl-num| acl-name Specifies, in number or name format, the access-control list to apply to all
interfaces within the default VRF, for all CPU-bound traffic.
sequence seq-num Defines the sequence number of the access-control list being applied as a
rACL. IPv4 rACL commands are applied in the order of the lowest to the
highest sequence numbers. The range of values is from 1 through 200.
policy-map policy-map-name
Specifies the name of a policy map. When the policy-map option is specified,
traffic matching the “permit “clause of the specified IPv4 ACL is rate-limited
as defined in the policy map and IPv4 traffic matching the “deny” clause in
the IPv4 ACL is permitted without rate limiting.
strict-acl
Specifies that traffic matching the “permit” clause of the specified IPv4 ACL is
rate-limited as defined in the policy map and IPv4 traffic matching the “deny”
clause in the IPv4 ACL is dropped in the hardware.
Command
Modes
Global configuration mode
Examples
The following example configures the IPv4 ACL “101”as a rACL with the sequence number “15”.
Brocade(config)# ip receive access-list 101 sequence 15
The following example configures the IPv4 ACL “acl_stand1” as an rACL with the sequence number
“10”.
Brocade(config)# ip receive access-list acl_stand1 sequence 10
The following example removes the strict-acl option so that traffic matching “deny” clauses starts
passing to the CPU: the rACL “acl_stand1” with the policy map “m1” remains.
Brocade(config)# no ip receive access-list acl_stand1 sequence 10 policy-map m1
strict-acl