R0106-HP MSR Router Series ACL and QoS Configuration Guide(V7)
13
Ste
p
Command
Remarks
3. Apply an ACL to the interface
to filter packets.
packet-filter [ ipv6 ] { acl-number |
name acl-name } { inbound |
outbound }
By default, an interface does not
filter packets.
You can apply up to 32 ACLs to the
same direction of an interface.
Applying an ACL to an interzone instance for packet filtering
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Enter interzone view.
interzone source
source-zone-name destination
destination-zone-name
N/A
3. Apply an ACL to the interzone
instance to filter packets.
packet-filter [ ipv6 ] { acl-number |
name acl-name }
By default, an interzone does not
filter packets.
You can apply up to 32 ACLs to the
same interzone instance.
Setting the interval for generating and outputting packet
filtering logs
After you set the interval, the device periodically generates and outputs the packet filtering logs to the
information center, including the number of matching packets and the matched ACL rules. For more
information about information center, see Network Management and Monitoring Configuration Guide.
To set the interval for generating and outputting packet filtering logs:
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Set the interval for generating
and outputting packet filtering
logs.
acl [ ipv6 ] logging interval interval
The default setting is 0 minutes,
which mean that no packet filtering
logs are generated.
Setting the packet filtering default action
Ste
p
Command
Remarks
1. Enter system view.
system-view N/A
2. Set the packet filtering default
action to deny.
packet-filter default deny
By default, the packet filter permits
packets that do not match any ACL
rule to pass.
Displaying and maintaining ACLs
Execute display commands in any view and reset commands in user view.