White Papers

Table Of Contents
Parameters
source address
Enter the IPv6 address of the network or host from which the packets were sent in
the x:x:x:x::x format followed by the prefix length in the /x format. The range is /0
to /128. The :: notation specifies successive hexadecimal fields of zero.
mask
Enter a network mask in /prefix format (/x).
any Enter the keyword any to specify that all routes are subject to the filter.
host
ipv6-
address
Enter the keyword host followed by the IPv6 address of the host in the x:x:x:x::x
format. The :: notation specifies successive hexadecimal fields of zero.
operator
(OPTIONAL) Enter one of the following logical operand:
eq = equal to
neq = not equal to
gt = greater than
lt = less than
range = inclusive range of ports (you must specify two port for the port
parameter.)
port port
Enter the application layer port number. Enter two port numbers if using the range
logical operand. The range is 0 to 65535.
The following list includes some common TCP port numbers:
23 = Telnet
20 and 21 = FTP
25 = SMTP
169 = SNMP
destination
address
Enter the IPv6 address of the network or host to which the packets are sent in
the x:x:x:x::x format followed by the prefix length in the /x format. The range is /0
to /128. The :: notation specifies successive hexadecimal fields of zero.
bit
Enter a flag or combination of bits:
ack: acknowledgement field
fin: finish (no more data from the user)
psh: push function
rst: reset the connection
syn: synchronize sequence numbers
urg: urgent field
count (OPTIONAL) Enter the keyword count to count packets processed by the filter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by the filter.
log (OPTIONAL) Enter the keyword log to enable the triggering of ACL log messages.
threshold-in
msgs
count
(OPTIONAL) Enter the threshold-in-msgs keyword followed by a value to
indicate the maximum number of ACL logs that can be generated, exceeding
which the generation of ACL logs is terminated with the seq, permit, or deny
commands. The threshold range is from 1 to 100.
interval
minutes
(OPTIONAL) Enter the keyword interval followed by the time period in minutes
at which ACL logs must be generated. The interval range is from 1 to 10 minutes.
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the traffic
that you want to monitor and the ACL in which you are creating the rule is applied
to the monitored interface.
Defaults
By default, 10 ACL logs are generated if you do not specify the threshold explicitly. The default frequency
at which ACL logs are generated is five minutes. By default, flow-based monitoring is not enabled.
Command Modes ACCESS-LIST
Supported Modes FullSwitch
224 Access Control Lists (ACL)