![Dell Force10 TeraScale C Series Reference Manual Download Page 692](http://html.mh-extra.com/html/dell/force10-terascale-c-series/force10-terascale-c-series_reference-manual_86009692.webp)
692
|
IPv6 Access Control Lists (IPv6 ACLs)
www.dell.com | support.dell.com
Command
History
Usage
Information
The C-Series cannot count both packets and bytes, so when you enter the
count byte
options, only
bytes are incremented.
Most ACL rules require one entry in the CAM. However, rules with TCP and UDP port operators (
gt
,
lt
,
range
) may require more than one entry. The range of ports is configured in the CAM based on
bitmask boundaries; the space required depends on exactly what ports are included in the range.
For example, an ACL rule with TCP port
range 4000 - 8000
will use 8 entries in the CAM:
But an ACL rule with TCP port
lt 1023
takes only one entry in the CAM:
Related
Commands
ipv6 access-group
c e s
Assign an IPv6 access-group to an interface.
Syntax
ipv6 access-group
access-list-name
{
in | out
} [
implicit-permit
] [
vlan range
]
To delete an IPv6 access-group configuration, use the
no ipv6 access-group
access-list-name
{
in
} [
implicit-permit
] [
vlan range
] command.
Parameters
Version 8.4.2.1
Introduced on the S-Series
Version 8.2.1.0
Introduced on the E-Series ExaScale
Version 7.8.1.0
Introduced on the C-Series
Version 7.4.1.0
Introduced on the E-Series TeraScale
Added
monitor
option
Rule# Data Mask From To #Covered
1 0000111110100000 1111111111100000 4000 4031 32
2 0000111111000000 1111111111000000 4032 4095 64
3 0001000000000000 1111100000000000 4096 6143 2048
4 0001100000000000 1111110000000000 6144 7167 1024
5 0001110000000000 1111111000000000 7168 7679 512
6 0001111000000000 1111111100000000 7680 7935 256
7 0001111100000000 1111111111000000 7936 7999 64
8 0001111101000000 1111111111111111 8000 8000 1
Total Ports: 4001
Rule# Data Mask From To #Covered
1 0000000000000000 1111110000000000 0 1023 1024
Total Ports: 1024
Assign a deny filter for IP traffic.
Assign a deny filter for TCP traffic.
access-list-name
Enter the name of a configured access list, up to 140 characters.
in
|
out
Enter either the keyword
in
or
out
to apply the IPv6 ACL to incoming traffic
(ingress) or outgoing traffic (egress).
Summary of Contents for Force10 TeraScale C Series
Page 1: ...FTOS Command Line Reference Guide FTOS 8 4 2 7 E Series TeraScale C Series S Series S50 S25 ...
Page 164: ...164 Control and Monitoring w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 176: ...176 802 1ag w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 188: ...188 802 3ah w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 204: ...204 802 1X w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 294: ...294 Access Control Lists ACL w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 428: ...428 Border Gateway Protocol IPv4 BGPv4 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 456: ...456 Configuration Rollback w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 472: ...472 Dynamic Host Configuration Protocol DHCP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 484: ...484 Far End Failure Detection FEFD w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 682: ...682 IPv4 Routing w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 732: ...732 IPv6 Basics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 896: ...896 Layer 2 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 914: ...914 Link Layer Detection Protocol LLDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 926: ...926 Multicast Listener Discovery MLD w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 952: ...952 Multiple Spanning Tree Protocol MSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 976: ...976 Multicast w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 984: ...984 Neighbor Discovery Protocol NDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1094: ...1094 Policy based Routing PBR w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1130: ...1130 PIM Sparse Mode PIM SM w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1164: ...1164 Private VLAN PVLAN w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1276: ...1276 Rapid Spanning Tree Protocol RSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1342: ...1342 Service Provider Bridging w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1354: ...1354 sFlow w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1428: ...1428 Spanning Tree Protocol STP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1444: ...1444 Time and Network Time Protocol NTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1464: ...1464 VLAN Stacking w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1494: ...1494 Virtual Router Redundancy Protocol VRRP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1534: ...1534 C Series Diagnostics and Debugging w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1574: ...1574 E Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1592: ...1592 S Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1622: ...1622 Index w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1640: ...1640 Command Index w w w d e l l c o m s u p p o r t d e l l c o m ...