IPv6 Configuration Guide K/KA/KB.15.15

Viewing the current MLD status.................................................................................................73
Configuring the current MLD.....................................................................................................74
Listing ports currently joined.....................................................................................................75
Viewing MLD statistics.............................................................................................................76
Viewing MLD counters.............................................................................................................78
MLD snooping........................................................................................................................79
General operation.............................................................................................................80
Forwarding in MLD snooping..............................................................................................81
Listeners and joins..............................................................................................................82
Queries............................................................................................................................82
Leaves..............................................................................................................................82
Fast leaves and forced fast leaves.........................................................................................83
Current MLD status..................................................................................................................83
Current MLD configuration.......................................................................................................84
Counters................................................................................................................................86
5 IPv6 Access Control Lists (ACLs)..................................................................87
Introduction............................................................................................................................87
Command Summary for Configuring ACLs............................................................................88
Command Summary for Enabling, Disabling, and Displaying ACLs..........................................89
Overview..............................................................................................................................93
Types of IPv6 ACLs.............................................................................................................93
Concurrent IPv4 and IPv6 ACLs............................................................................................93
IPv6 ACL applications........................................................................................................93
RACL applications.........................................................................................................93
VACL applications.........................................................................................................94
IPv6 static port ACL applications.....................................................................................95
RADIUS-assigned (dynamic) port ACL applications............................................................95
Effect of RADIUS-assigned ACLs when multiple clients are using the same port..................95
802.1X user-based and port-based applications............................................................96
Operating notes for IPv6 applications..............................................................................96
Multiple ACL assignments on an interface.............................................................................97
About filtering inbound traffic with multiple ACLS...............................................................97
Filtering outbound traffic.................................................................................................98
Permitting traffic filtered through multiple ACLs..................................................................98
Features common to all ACL applications..............................................................................99
General steps for planning and configuring ACLs.....................................................................100
IPv6 ACL operation...............................................................................................................101
Packet-filtering process......................................................................................................102
Planning an ACL application..................................................................................................103
IPv6 traffic management and improved network performance................................................104
Security..........................................................................................................................105
Guidelines for planning the structure of an ACL....................................................................105
ACL configuration and operating rules................................................................................106
How an ACE uses a prefix to screen packets for SA and DA matches......................................107
Prefix usage differences between ACLs and other IPv6 addressing.....................................109
Configuring and assigning an IPv6 ACL..................................................................................109
Implementing IPv6 ACLs....................................................................................................109
Permit/deny options.........................................................................................................110
Overriding an implicit deny...............................................................................................110
ACL configuration............................................................................................................111
ACL Configuration Structure..........................................................................................111
ACL configuration factors..................................................................................................113
The sequence of entries in an ACL is significant...............................................................113
Implied deny function..................................................................................................114
Contents 5