Administrator Guide

Table Of Contents
of the far end tunnel peer, rather than to the tunnel destination. This reduces the
chance of both ends of the tunnel staying in keepalive down state. If both ends get
into a keepalive down state that does not clear in a few seconds, then performing
shutdown - no shutdown sequence on one end should bring both ends back to
up.
tunnel allow-remote
Configure an IPv4 or IPv6 address or prefix whose tunneled packets are accepted for decapsulation. If
you do not configure allow-remote entries, tunneled packets from any remote peer address is accepted.
Z9000
Syntax tunnel allow-remote {ip-address | ipv6-address} [mask]
To delete a configured allow-remote entry use the no tunnel allow-remote
command. Any specified address/mask values must match an existing entry for the
delete to succeed. If the address and mask are not specified, this command deletes
all allow-remote entries.
Parameters
ip-address Enter the source IPv4 address in A.B.C.D format.
ipv6–address Enter the source IPv6 address in X:X:X:X::X format.
mask (OPTIONAL) Enter a network mask in /prefix format (/x) or
A.B.C.D to match a range of remote addresses. The default
mask is /32 for IPv4 addresses and /128 for IPv6 addresses,
which match only the specified address.
Defaults If you do not configure tunnel allow remote , all traffic which is destined to tunnel
source address is decapsulated.
Command
Modes
INTERFACE TUNNEL
Command
History
Version 9.4(0.0) Introduced on the S4810, S4820T, S6000 and Z9000.
Usage
Information
You can configure up to eight allow-remote entries on any multipoint receive-only
tunnel.
This command fails if the address family entered does not match the outer header
address family of the tunnel mode, tunnel source, or any other tunnel allow-
remote.
If you configure any allow-remote , the tunnel source or tunnel mode commands
fail if the outer header address family does not match that of the configured allow-
remote.
1566
Tunneling