You can use received ACL (RACL) policies to permit or deny unicast and multicast control packets that are destined to the local processor.
You can configure RACL entries with match criteria for packets and an action for discarding packets. RACL policies can permit or deny control packets and also count the number of packets hitting the policy.
For more information about RACL, see Receive ACL Rate Limiting.
For more information about ACLs, see the Extreme SLX-OS Security Configuration Guide.
For more information about the commands in the following examples, see the Extreme SLX-OS Command Reference.
ip access-list extended <name_ssh_flow> seq <num> permit tcp <ip network addr> <subnet mask> any eq 22 count ip receive access-group <name_ssh_flow> sequence <num>
ip access-list extended ip-ssh seq 10 permit tcp 10.10.10.10 0.0.0.255 any eq 22 count seq 20 permit tcp 11.11.11.11 0.0.0.255 any eq 22 count seq 100 deny tcp any any eq 22 count ip receive access-group ip-ssh sequence 10
ipv6 access-list extended ipv6-ssh seq 10 permit tcp 2000::/32 any eq 22 count seq 20 permit tcp 2004::/32 any eq 22 count seq 100 deny tcp any any eq 22 count ipv6 receive access-group ipv6-ssh sequence 10
ip access-list extended ip-vrrp seq 10 permit 112 host 10.1.1.10 host 224.0.0.18 count seq 20 permit 112 7.7.7.7 0.0.0.255 host 224.0.0.18 count seq 100 deny 112 any host 224.0.0.18 count ip receive access-group ip-vrrp sequence 20
Note
CoPP for multicast flows does not support IPv6 control packets.