Reference Guide

particularly useful when looking for malicious traffic. It is available for Layer 2 and
Layer 3 ingress and egress traffic. You may specify traffic using standard or
extended access-lists. This mechanism copies all incoming or outgoing packets on
one port and forwards (mirrors) them to another port. The source port is the
monitored port (MD) and the destination port is the monitoring port (MG).
ipv6 access-list
Configure an access list based on IPv6 addresses or protocols.
C9000 Series
Syntax
ipv6 access-list access-list-name
To delete an access list, use the no ipv6 access-list access-list-name
command.
Parameters
access-list-name Enter the access list name as a string, up to 140 characters.
Defaults All access lists contain an implicit “deny any”; that is, if no match occurs, the packet
is dropped.
Command Modes CONFIGURATION
Command History
This guide is platform-specific. For command information about other platforms,
refer to the relevant Dell Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.9(0.0) Introduced on the C9010.
9.2(1.0) Introduced on the Z9500.
8.3.19.0 Introduced on the S4820T.
8.3.7.0 Introduced on the S4810.
8.4.2.1 Introduced on the S-Series.
8.2.1.0 Introduced on the E-Series ExaScale.
7.8.1.0 Introduced on the C-Series. Increased the name string to
accept up to 140 characters. Prior to version 7.8.1.0, names
are up to 16 characters long.
7.4.1.0 Introduced on the E-Series TeraScale.
Usage Information The number of entries allowed per ACL is hardware-dependent. For detailed
specification on entries allowed per ACL, refer to your line card documentation.
IPv6 Access Control Lists (IPv6 ACLs)
1171