C613-50102-01 REV C
Command Reference for x510 Series
1475
AlliedWare Plus™ Operating System - Version 5.4.6-1.x
IP
V
6 H
ARDWARE
A
CCESS
C
ONTROL
L
IST
(ACL) C
OMMANDS
(
IPV
6
ACCESS
-
LIST
NAMED
IP
V
6
FILTER
)
(ipv6 access-list named IPv6 filter)
Overview
Use this ACL filter to add a filter entry to the current named IPv6 access-list for an
IPv6 source and destination address and prefix.
If you specify a sequence number, the new entry is inserted at the specified
location. Otherwise, the new entry is added at the end of the access-list.
Note that specifying the
send-to-cpu
parameter could result in EPSR healthcheck
messages and other control packets being dropped.
As an optional parameter,
vlan
can be matched for tagged (802.1q) packets.
The
no
variant of this command removes a filter entry from the current named IPv6
access-list for an IPv6 source and destination address and prefix. You can specify
the filter entry for removal by entering either its sequence number, or its filter entry
profile.
NOTE
:
Hardware ACLs will
permit
access unless
explicitly denied
by an ACL action.
Syntax
[<
sequence-number
>
{deny|permit|send-to-cpu|send-to-mirror|copy-to-cpu|
copy-to-mirror}
ipv6 {<
ipv6-source-address/prefix-length
>|
<
ipv6-source-address
> <
ipv6-source-wildcard
>|
host <
ipv6-source-host
>|any}
{<
ipv6-destination-address/prefix-length
>|
<
ipv6-destintation-addr
> <
ipv6-destination-wildcard
>|
host <
ipv6-destination-host-address
>|any}
[vlan <
1-4094
>]
no [<
sequence-number
>]
{deny|permit|send-to-cpu|send-to-mirror|copy-to-cpu|
copy-to-mirror}
ipv6 {<
ipv6-source-address/prefix-length
>|
<
ipv6-source-address
> <
ipv6-source-wildcard
>|
host <
ipv6-source-host
>|any}
{<
ipv6-destination-address/prefix-length
>|
<
ipv6-destination-address
> <
ipv6-destination-wildcard
>|
host <
ipv6-destination-host-address
>|any}
[<
icmp-type
>] [vlan <
1-4094
>]
no [<
sequence-number
>]
Parameter
Description
<
sequence-number
>
The sequence number for the filter entry of the
selected access control list, from 1 to 65535.
deny
Specifies the packets to reject.
permit
Specifies the packets to permit.
send-to-cpu
Specifies the packets to send to the CPU.
Specifying this parameter could result in EPSR
healthcheck messages and other control
packets being dropped.