
Chapter 9
| Access Control Lists
IPv6 ACLs
– 343 –
Command Mode
Global Configuration
Command Usage
◆
When you create a new ACL or enter configuration mode for an existing ACL,
use the
permit
or
deny
command to add new rules to the bottom of the list. To
create an ACL, you must add at least one rule to the list.
◆
To remove a rule, use the
no permit
or
no deny
command followed by the
exact text of a previously configured rule.
◆
An ACL can contain up to 96 rules.
Example
Console(config)#access-list ipv6 standard david
Console(config-std-ipv6-acl)#
Related Commands
permit, deny (Standard IPv6 ACL) (343)
permit, deny (Extended IPv6 ACL) (344)
ipv6 access-group (345)
show ipv6 access-list (346)
permit, deny
(Standard IPv6 ACL)
This command adds a rule to a Standard IPv6 ACL. The rule sets a filter condition for
packets emanating from the specified source. Use the
no
form to remove a rule.
Syntax
{
permit
|
deny
} {
any
|
host
source-ipv6-address
|
source-ipv6-address
[
/prefix-length
]} [
time-range
time-range-name
]
no
{
permit
|
deny
} {
any
|
host
source-ipv6-address
|
source-ipv6-address
[
/prefix-length
]}
any
– Any source IP address.
host
– Keyword followed by a specific IP address.
source-ipv6-address
- An IPv6 source address or network class. The address
must be formatted according to RFC 2373 “IPv6 Addressing Architecture,”
using 8 colon-separated 16-bit hexadecimal values. One double colon may
be used in the address to indicate the appropriate number of zeros
required to fill the undefined fields.
prefix-length
- A decimal value indicating how many contiguous bits (from
the left) of the address comprise the prefix; i.e., the network portion of the
address. (Range: 0-128)
time-range-name
- Name of the time range. (Range: 1-32 characters)
Содержание AS5700-54X
Страница 42: ...Contents 42...
Страница 44: ...Figures 44...
Страница 52: ...Tables 52...
Страница 54: ...Section I Getting Started 54...
Страница 80: ...Chapter 1 Initial Switch Configuration Setting the System Clock 80...
Страница 210: ...Chapter 6 Remote Monitoring Commands 210...
Страница 358: ...Chapter 9 Access Control Lists ACL Information 358...
Страница 418: ...Chapter 12 Port Mirroring Commands RSPAN Mirroring Commands 418...
Страница 436: ...Chapter 15 UniDirectional Link Detection Commands 436...
Страница 442: ...Chapter 16 Address Table Commands 442...
Страница 506: ...Chapter 18 VLAN Commands Configuring VXLAN Tunneling 506...
Страница 526: ...Chapter 19 Class of Service Commands Priority Commands Layer 3 and 4 526...
Страница 544: ...Chapter 20 Quality of Service Commands 544...
Страница 652: ...Chapter 22 Multicast Filtering Commands MLD Proxy Routing 652...
Страница 680: ...Chapter 23 LLDP Commands 680...
Страница 722: ...Chapter 24 CFM Commands Delay Measure Operations 722...
Страница 732: ...Chapter 25 Domain Name Service Commands 732...
Страница 790: ...Chapter 27 IP Interface Commands ND Snooping 790...
Страница 1072: ...Section III Appendices 1072...
Страница 1090: ...Glossary 1090 XModem A protocol used to transfer files between devices Data is grouped in 128 byte blocks and error corrected...
Страница 1102: ...List of CLI Commands 1102...
Страница 1115: ......
Страница 1116: ...AS5700 54X AS6700 32X E032016 ST R02 149100000198A...