Brocade Multi-Service IronWare Switching Configuration Guide (Supporting R05.6.00) User Manual
Page 912
![background image](/manuals/361635/912/background.png)
882
Multi-Service IronWare Switching Configuration Guide
53-1003036-02
RPF configuration
22
Configuring a timer interval for IPv6 session logging
You can use the ipv6 session-logging-age command to globally configure a timer interval for IPv6
session logging. The timer interval is set for 3 minutes in the following example.
Brocade(config)# ipv6 session-logging-age 3
Syntax: [no] ipv6 session-logging-age minutes
The minutes variable sets the timer interval for logging. Configurable values are from 1 through 10
minutes. The default value is 5 minutes.
You can use the show log command to view RPF messages, as shown in the following example.
Brocade# show log
Dec 18 19:32:52:I:IPv6 RPF: Denied 1 packet(s) on port 1/2 tcp fec0:1::2(0) ->
4500:1::2(0)
Suppressing RPF for packets with specified
address prefixes
NOTE
This section is not applicable for the Brocade NetIron CES and Brocade NetIron CER devices
because, with these devices, RPF takes precedence over PBR and ACLs.
You can suppress RPF packet drops for a specified set of packets using inbound ACLs. To suppress
RPF packets:
1. Create an IPv4 or IPv6 ACL that identifies the address range that you do not want dropped.
2. Specify the flag to the ACL permit clause of the suppress-rpf-drop command.
When a packet that fails the RPF check and matches the specified ACL permit clause with the
suppress-rpf-drop flag set, it is forwarded as a normal packet and it is accounted as a “unicast RPF
suppressed drop packet,” as described in
.
NOTE
The suppress-rpf-drop command is not supported on Brocade NetIron CES and Brocade NetIron CER
devices.
The following example demonstrates the configuration of the IPv4 ACL named “access-list 135”
which permits traffic from the source network 10.4.4.0/24 even if the RPF check test fails.
Brocade(config)# access-list 135 permit ip 10.4.4.0.0.0.0.255 any
suppress-rpf-drop
Brocade(config)# access-list 135 permit ip any any
The following example demonstrates the configuration of the IPv6 ACL named “rpf1” which permits
traffic from the source host 2002::1 even if the RPF check test fails.
Brocade(config)# ipv6 access-list rpf1
Brocade(config-ipv6-access-list rpf1)# permit tcp host 2002::1 any
suppress-rpf-drop