User's Manual

Table Of Contents
49-21
the user-specified priority.
49.5.2 IPv6 DCSCM Configuration Task Sequence
1 The source control configuration
2 The destination control configuration
3 The multicast policy configuration
1
The source control configuration
The source control configuration has three steps, first is globally enabling the source control, the following is
the command of globally enabling the source control:
Command
Explanation
Global Configuration Mode
ipv6 multicast source-control(necessary)
no ipv6 multicast source-control
Globally enable the source control, the no
operation of this command will globally
disable the source control. What should be
paid attention to is that, once globally enable
the source control, all the multicast
messages will be dropped by default. All the
source control configurations can only be
done after globally enabled, and only when
all the configured rules are disabled, the
source control can be disabled globally.
The next is configuring the source control rules, which adopts the same method as configuring ACL, using
ACL number from 8000 to 8099, while each rule number can configure 10 rules. What should be paid
attention to is that these rules have orders, the earliest configured rule is at the front. Once a rule is matched,
the following ones will not take effect, so the globally enabled rules should be the last to configure. The
following is the command:
Command
Explanation
Global Configuration Mode
[no] ipv6 access-list <8000-8099>
{deny|permit}
{{<source/M>}|{host-source
<source-host-ip>}|any-source}
{{<destination/M> }|{host-destination
<destination-host-ip>}|any-destination}
Used to configure the source control rules,
the rules can only take effect when applied
to the specified port. The no operation of this
command can delete the specified rule.
The last is to configure the rules to the specified port.
Pay attention: since the configured rules will take up entries of hardware, configuring too many rules might
cause failure if the underlying entries are full, so it is recommended that users adopt rules as simple as
possible. The following is the configuration command:
Command
Explanation