IPv6 Configuration Guide K/KA/KB.15.15

Example 67 Showing two ACEs entered in an ACL context:
#permit icmp any any 1 3
#permit icmp any any destination-unreachable
[ icmp-type [ icmp-code ]]
This option identifies an individual ICMP packet type as criteria for permitting or
denying that type of ICMP traffic in an ACE.
icmp-type—This value is in the range of 0 to 255 and corresponds to an ICMP
packet type.
icmp-code—This value corresponds to an ICMP code for an ICMP packet type.
It is optional and needed only when a particular ICMP subtype is needed as
a filtering criterion.
Range: 0 to 255
For example, the following ACE specifies "destination unreachable" (ICMP type 1)
where "address unreachable" (3; a subtype of "destination unreachable") is the
specific code.
#permit icmp any any 1 3
[ icmp-type-name ]
These name options are an alternative to the [ icmp-type [ icmp-code ] ] methodology
described above. For more information, visit the IANA website cited above.
mobile-advertisecert-path-advertise
mobile-solicitcert-path-solicit
nd-nadestination-unreachable
nd-nsecho-reply
node-infoecho-request
node-queryhome-agent-reply
packet-too-bighome-agent-request
mobile-advertisecert-path-advertise
parameter-probleminv-nd-na
redirectinv-nd-ns
router-advertisementmcast-router-advertise
router-renummcast-router-solicit
router-solicitationmcast-router-terminate
time-exceededmld-done
ver2-mld-reportmld-query
mld-report
Filtering routed IPv6 traffic
Adding or Removing an ACL Assignment On an Interface
You can assign the same ACL to filter both inbound and outbound routed traffic, and to filter traffic
on multiple VLANs. For limits and operating rules, see ACL configuration and operating rules
(page 106).
Syntax:
[no] vlan vid ipv6 access-group identifier [ in | out ]
122 IPv6 Access Control Lists (ACLs)