Technical data
90 ServerIron ADX NAT64 Configuration Guide
53-1002288-02
ACL overview
5
DRAFT: BROCADE CONFIDENTIAL
• echo-request
• header
• hop-limit
• mld-query
• mld-reduction
• mld-report
• nd-na
• nd-ns
• next-header
• no-admin
• no-route
• packet-too-big
• parameter-option
• parameter-problem
• port-unreachable
• reassembly-timeout
• renum-command
• renum-result
• renum-seq-number
• router-advertisement
• router-renumbering
• router-solicitation
• sequence
• time-exceeded
• unreachable
NOTE
If you do not specify a message type, the ACL applies to all types ICMP messages types.
Applying an IPv6 ACL to an interface
To apply an IPv6 ACL to an interface, enter commands such as the following:
ServerIronADX(config)# interface ethernet 3/1
ServerIronADX(config-if-e100-3/1)# ipv6 traffic-filter access1 in
This example applies the IPv6 ACL “access1” to incoming IPv6 packets on Ethernet interface 3/1.
As a result, Ethernet interface 3/1 denies all incoming packets from the site-local prefix
fec0:0:0:2::/64 and the global prefix 2001:100:1::/48 and permits all other incoming packets.
Syntax: ipv6 traffic-filter <ipv6-acl-name> in
For the <ipv6-acl-name> parameter, specify the name of an IPv6 ACL created using the ipv6
access-list command.
The in keyword applies the specified IPv6 ACL to incoming IPv6 packets on the interface.