No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Feature Description - LAN Access and MAN Access 01

NE05E and NE08E V300R003C10SPC500

This is NE05E and NE08E V300R003C10SPC500 Feature Description - LAN Access and MAN Access
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
ACLs Applied to a Multicast Policy

ACLs Applied to a Multicast Policy

Matching Principle of ACLs Applied to a Multicast Policy

When an ACL is applied to a multicast policy,

  • If a multicast route matches the permit rule, the action defined in multicast policy is done.
  • If a multicast route matches the deny rule, the action defined in multicast policy is not executed.
  • If a multicast route does not match any rule, or the ACL does not exist, or there is no rule in the ACL, the multicast route are deny in most multicast policies. For detailed information, see Table 3-7.
Table 3-7 The default matching result of mismatched routes in a multicast policy
Multicast Policy ACL Matching Result Processing Result of Policy

static-rp group-policy

c-rp group-policy

Not match any rule in ACL Permit
ACL does not exist Permit
There is no rule in the ACL
Multicast boundary policy Not match any rule in ACL Deny

ACL does not exist

Or there is no rule in the ACL

Permit
Other multicast policies Not match any rule in ACL Deny
Or the ACL does not exist,
Or there is no rule in the ACL

ACL Filter Options Supported by a Multicast Policy

When ACL is applied to multicast policy,

  • The source-address in a basic ACL indicates the source of multicast data packets, multicast routes, or group-address. A basic ACL applied to multicast policy only supports two parameters, that is, source and time-range.
  • Advanced ACL applied to multicast policy only supports two or three parameters, that is,
    • Most multicast policies support only source, destination and time-range
    • A few multicast policies supports only source and time-range
    • Other multicast policies supports only destination and time-range
NOTE:
Named ACLs applied to multicast policy can only be advanced ACLs. If the named ACL number is out of the range, the ACL does not take effect.
Translation
Download
Updated: 2019-01-14

Document ID: EDOC1100058932

Views: 7520

Downloads: 11

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next