C613-50100-01 REV C Command Reference for x930 Series 1950
AlliedWare Plus™ Operating System - Version 5.4.6-1.x
IPV6 HARDWARE ACCESS CONTROL LIST (ACL) COMMANDS
(IPV6 ACCESS-LIST NAMED IPV6 FILTER)
(ipv6 access-list named IPv6 filter)
Overview Use this ACL filter to add a filter entry to the current named IPv6 access-list for an
IPv6 source and destination address and prefix.
If you specify a sequence number, the new entry is inserted at the specified
location. Otherwise, the new entry is added at the end of the access-list.
Note that specifying the send-to-cpu parameter could result in EPSR healthcheck
messages and other control packets being dropped.
As an optional parameter, vlan can be matched for tagged (802.1q) packets.
The no variant of this command removes a filter entry from the current named IPv6
access-list for an IPv6 source and destination address and prefix. You can specify
the filter entry for removal by entering either its sequence number, or its filter entry
profile.
NOTE: Hardware ACLs will permit access unless explicitly denied by an ACL action.
Syntax
[<sequence-number>
{deny|permit|send-to-cpu|send-to-mirror|copy-to-cpu|
copy-to-mirror}
ipv6 {<ipv6-source-address/prefix-length>|
<ipv6-source-address> <ipv6-source-wildcard>|
host <ipv6-source-host>|any}
{<ipv6-destination-address/prefix-length>|
<ipv6-destintation-addr> <ipv6-destination-wildcard>|
host <ipv6-destination-host-address>|any}
[vlan <1-4094>]
no [<sequence-number>]
{deny|permit|send-to-cpu|send-to-mirror|copy-to-cpu|
copy-to-mirror}
ipv6 {<ipv6-source-address/prefix-length>|
<ipv6-source-address> <ipv6-source-wildcard>|
host <ipv6-source-host>|any}
{<ipv6-destination-address/prefix-length>|
<ipv6-destination-address> <ipv6-destination-wildcard>|
host <ipv6-destination-host-address>|any}
[<icmp-type>] [vlan <1-4094>]
no [<sequence-number>]
Parameter Description
<sequence-number> The sequence number for the filter entry of the
selected access control list, from 1 to 65535.
deny Specifies the packets to reject.
permit Specifies the packets to permit.
send-to-cpu Specifies the packets to send to the CPU.
Specifying this parameter could result in EPSR
healthcheck messages and other control
packets being dropped.