Users Guide

Table Of Contents
Supported
Releases
10.5.2.0 or later
managed-config-flag
Verifies the advertised managed configuration parameter.
Syntax
managed-config-flag {on | off}
Parameters
onSpecifies the managed configuration flag as on.
offSpecifies the managed configuration flag as off.
Default None
Command Mode RA GUARD POLICY LIST CONFIGURATION
Usage
Information
If this command is set to off, the system verifies that the advertised managed configuration parameter is
not set in the RA packet and the other way round.
Examples
OS10(conf-ra_guard_policy_list)# managed-config-flag on
OS10(conf-ra_guard_policy_list)# managed-config-flag off
Supported
Releases
10.5.2.0 or later
match ra
Verifies the source IPv6 address, prefix address, and the source MAC address of the inspected messages.
Syntax
match ra {ipv6-access-list | ipv6-prefix-list | mac-access-list} name
Parameters
ipv6-access-list nameEnter ipv6-access-list and the name of the access list.
ipv6-prefix-list nameEnter ipv6-prefix-list and the name of the prefix list.
mac-access-list nameEnter mac-access-list and the name of the MAC access list.
Default None
Command Mode RA GUARD POLICY LIST CONFIGURATION
Usage
Information
If you do not configure this command, the system bypasses the verification process.
If you configure all three access lists, OS10 matches the inspected packets against all the configured
policies.
For the IPv6 access list, the system verifies only the IPv6 source address. For the MAC access list,
the system verifies only the source MAC address.
NOTE: If you have configured the policy using the match ra command, but not configured the
access lists or ACLs, the system bypasses the verification process. Generic ACL behavior applies
when the policy is attached to interface.
The no form of this command removes the configuration.
Example
OS10(conf-ra_guard_policy_list)# match ra ipv6-access-list
test_access_list
Supported
Releases
10.5.2.0 or later
916 Layer 3