White Papers

Table Of Contents
Use the no permit udp {source address mask | any | host ipv6-address}
{destination address | any | host ipv6-address} command.
Parameters
source address
Enter the IPv6 address of the network or host from which the packets were sent in
the x:x:x:x::x format followed by the prefix length in the /x format. The range is /0
to /128. The :: notation specifies successive hexadecimal fields of zero.
mask
Enter a network mask in /prefix format (/x).
any Enter the keyword any to specify that all routes are subject to the filter.
host
ipv6-
address
Enter the keyword host followed by the IPv6 address of the host in the x:x:x:x::x
format. The :: notation specifies successive hexadecimal fields of zero.
operator
(OPTIONAL) Enter one of the following logical operand:
eq = equal to
neq = not equal to
gt = greater than
lt = less than
range = inclusive range of ports (you must specify two port for the port
parameter.)
port port
(OPTIONAL) Enter the application layer port number. Enter two port numbers if
using the range logical operand. The range is 0 to 65535.
destination
address
Enter the IPv6 address of the network or host to which the packets are sent in
the x:x:x:x::x format followed by the prefix length in the /x format. The range is /0
to /128. The :: notation specifies successive hexadecimal fields of zero.
count (OPTIONAL) Enter the keyword count to count packets processed by the filter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by the filter.
Defaults Not configured.
Command Modes ACCESS-LIST
Command
History
This guide is platform-specific. For command information about other platforms, see the relevant Dell
EMC Networking OS Command Line Reference Guide.
Version Description
9.10(0.0) Introduced on the S6100ON.
9.8(1.0) Introduced on the Z9100ON.
9.0.2.0 Introduced on the S6000.
8.4.2.1 Introduced on the S-Series.
8.2.1.0 Introduced on the E-Series ExaScale.
7.8.1.0 Introduced on the C-Series.
7.4.1.0 Introduced on the E-Series TeraScale. Added the monitor option.
Usage
Information
Most ACL rules require one entry in the CAM. However, rules with TCP and UDP port operators (gt, lt,
range) may require more than one entry. The range of ports is configured in the CAM based on bitmask
boundaries; the space required depends on exactly what ports are included in the range.
Example
An ACL rule with a TCP port range 4000 - 8000 uses eight entries in the CAM:
Rule# Data Mask From To #Covered
1 0000111110100000 1111111111100000 4000 4031 32
2 0000111111000000 1111111111000000 4032 4095 64
3 0001000000000000 1111100000000000 4096 6143 2048
4 0001100000000000 1111110000000000 6144 7167 1024
5 0001110000000000 1111111000000000 7168 7679 512
6 0001111000000000 1111111100000000 7680 7935 256
232 Access Control Lists (ACL)