IP
6 H
A
C
V
ARDWARE
CCESS
ONTROL
(
6
-
IP
6
IPV
ACCESS
LIST NAMED
V
(ipv6 access-list named IPv6 filter)
Overview
Use this ACL filter to add a filter entry to the current named IPv6 access-list for an
IPv6 source and destination address and prefix.
If you specify a sequence number, the new entry is inserted at the specified
location. Otherwise, the new entry is added at the end of the access-list.
Note that specifying the send-to-cpu parameter could result in EPSR healthcheck
messages and other control packets being dropped.
As an optional parameter, vlan can be matched for tagged (802.1q) packets.
The no variant of this command removes a filter entry from the current named IPv6
access-list for an IPv6 source and destination address and prefix. You can specify
the filter entry for removal by entering either its sequence number, or its filter entry
profile.
NOTE
[<sequence-number>
Syntax
{deny|permit|send-to-cpu|send-to-mirror|copy-to-cpu|
copy-to-mirror}
ipv6 {<ipv6-source-address/prefix-length>|
<ipv6-source-address> <ipv6-source-wildcard>|
host <ipv6-source-host>|any}
{<ipv6-destination-address/prefix-length>|
<ipv6-destintation-addr> <ipv6-destination-wildcard>|
host <ipv6-destination-host-address>|any}
[vlan <1-4094>]
no [<sequence-number>]
{deny|permit|send-to-cpu|send-to-mirror|copy-to-cpu|
copy-to-mirror}
ipv6 {<ipv6-source-address/prefix-length>|
<ipv6-source-address> <ipv6-source-wildcard>|
host <ipv6-source-host>|any}
{<ipv6-destination-address/prefix-length>|
<ipv6-destination-address> <ipv6-destination-wildcard>|
host <ipv6-destination-host-address>|any}
[<icmp-type>] [vlan <1-4094>]
no [<sequence-number>]
C613-50103-01 REV A
L
(ACL) C
IST
OMMANDS
)
FILTER
: Hardware ACLs will permit access unless explicitly denied by an ACL action.
Parameter
<sequence-number>
deny
permit
send-to-cpu
Command Reference for x310 Series
AlliedWare Plus™ Operating System - Version 5.4.6-1.x
Description
The sequence number for the filter entry of the
selected access control list, from 1 to 65535.
Specifies the packets to reject.
Specifies the packets to permit.
Specifies the packets to send to the CPU.
Specifying this parameter could result in EPSR
healthcheck messages and other control
packets being dropped.
1444