You can configure an IPv6 RA guard policy for an interface to filter RA messages in the following situations:
The system view is displayed.
An IPv6 RA guard policy is created.
When an ACL is used as a matching rule, RA messages will not match against the ACL if the ACL is not created, no rule is configured in the ACL, or the rule configured in the ACL is not the source MAC address, source IPv6 address, or IPv6 prefix. In the matching process, the permit and deny actions configured in the ACL are ignored, and the focus is only on the rule (source MAC address, source IPv6 address, or IPv6 prefix) configured in the ACL. That is, RA messages are forwarded as long as they match the rule.
An ACL is configured to match RA messages against the source MAC address in RA messages.
By default, no ACL is configured to match RA messages against the source MAC address in RA messages.
A matching rule is specified using a Layer 2 ACL. For details about how to configure a Layer 2 ACL, see Configuring a Layer 2 ACL in "ACL Configuration."
An ACL is configured to match RA messages against the source IPv6 address in RA messages.
By default, no ACL is configured to match RA messages against the source IPv6 address in RA messages.
A matching rule is specified using a basic ACL6. For details about how to configure a basic ACL6, see Configuring a Basic ACL6 in "ACL Configuration."
An ACL is configured to match RA messages against the IPv6 prefix in RA messages.
By default, no ACL is configured to match RA messages against the IPv6 prefix in RA messages.
A matching rule is specified using a basic ACL6. For details about how to configure a basic ACL6, see Configuring a Basic ACL6 in "ACL Configuration."
A rule is configured to match RA messages against the maximum or minimum hop limit in RA messages.
By default, the maximum and minimum hop limits in an RA message are 255 and 1 respectively.
A rule is configured to match RA messages against the M flag in RA messages.
By default, no rule is configured to match RA messages against the M flag in RA messages.
A rule is configured to match RA messages against the O flag in RA messages.
By default, no rule is configured to match RA messages against the O flag in RA messages.
A rule is configured to match RA messages against the highest route preference in RA messages.
By default, no rule is configured to match RA messages against the highest route preference in RA messages.
Return to the system view.
The Layer 2 interface view is displayed.
The IPv6 RA guard policy is applied to the interface.
By default, no IPv6 RA guard policy is applied to an interface.