Ipv6 receive access-list – Brocade Multi-Service IronWare Security Configuration Guide (Supporting R05.6.00) User Manual
Page 246
![background image](/manuals/361632/246/background.png)
228
Multi-Service IronWare Security Configuration Guide
53-1003035-02
ipv6 receive access-list
4
ipv6 receive access-list
Configures an IPv6 access-control list as an IPv6 receive access-control list (rACL).
The no form of the basic command removes the rACL.
The no form of the command with the policy-map option specified removes both the policy-map
and the strict-acl option: the rACL remains.
The no form of the command with both policy-map and strict-acl options specified, removes the
strict-acl option: the rACL with policy-map remains and traffic matching “deny” clauses starts
passing to the CPU.
Syntax
ipv6 receive access-list acl-name sequence seq-num [policy-map policy-map-name [strict-acl]]
[no] ipv6 receive access-list acl-name sequence seq-num [policy-map policy-map-name [strict-acl]]
Command
Default
By default, traffic matching the “permit” clause in the specified IPv6 ACL is permitted and traffic
matching the “deny” clause in the IPv6 ACL is dropped in the hardware.
Parameters
acl-name
Specifies the name of the access-control list to apply to all interfaces within
the default VRF, for all CPU-bound traffic. The maximum length of the
access-control list name is 256 characters.
sequence seq-num Defines the sequence number of the access-control list being applied as a
rACL. IPv6 rACL commands are applied in the order of the lowest to the
highest sequence numbers. The range of values is from 1 through 50.
policy-map policy-map-name
Specifies the name of a policy map. When the policy-map option is specified,
traffic matching the “permit “clause of the specified IPv6 ACL is rate-limited
as defined in the policy map and IPv6 traffic matching the “deny” clause in
the IPv6 ACL is permitted without any rate limiting.
strict-acl
Specifies that traffic matching the “permit” clause of the specified IPv6 ACL is
rate-limited as defined in the policy map and IPv6 traffic matching the “deny”
clause in the IPv6 ACL is dropped in the hardware.
Command
Modes
Global configuration mode
Examples
The following example configures an IPv6 rACL to apply the ACL “b1” with a sequence number of
“15” to all interfaces within the default VRF, for all CPU-bound traffic.
Brocade(config)# ipv6 receive access-list b1 sequence 15
The following example configures an IPv6 rACL with a policy map “m1”. The rACL applies the ACL
“b1” with a sequence number of “15” to all interfaces within the default VRF, for all CPU-bound
traffic. Traffic matching the permit clause of the “b1” ACL is rate-limited as defined in in the policy
map ”m1” and traffic matching the “deny” clause in ”b1” ACL is permitted without any rate limiting.
Brocade(config)# ipv6 receive access-list b1 sequence 15 policy map m1
The following example removes the strict-acl option so that traffic matching “deny” clauses starts
passing to the CPU: the rACL with the policy map “m1” remains.
Brocade(config)# no ipv6 receive access-list b1 sequence 15 policy-map m1
strict-acl