seq (ipv6 access-list rules)

Inserts filtering rules in IPv6 access lists (ACLs).

Syntax

seq { 1-4095 } [ permit | deny ] [ tcp | udp | icmpv6 | igmpv6 | ipv6 | esp | 1-254 ] | [ vxlan | nvgre | gre | ipip| gtpc | gtpu ] { 1-4294967295 } [ src-ip | prefix-length | src-ip src-mask ] [ dst-ip | prefix-length | dst-ip dst-mask ] { sport 1-65535} { dport 1-65535 } { sport-end 1-65535 } { dport-end 1-65535 } { dscp 1-63 } { length 64-9000 | length-end 65-9000 } { push } { sync } { ack } { fin } { urg } { cwr } { ece } { reset } {{ morefragment | dontfragment }} { vlan 0-4095} { count } { log } { qos-forwarding-group group-name }
no seq ID

Parameters

seq ID
Specifies the sequence ID for the rule. This parameter is mandatory. Valid values range from 1 through 4095, and the value must be unique within the selected IP ACL.
If the value is not specified, a non-assigned value starting from 10 with an increment of 10 is assigned.
permit |deny
Specifies the forwarding action for the matching traffic.
tcp|udp | icmpv6 |igmpv6 | ipv6 | esp | protocol-number
Specifies the protocol type of the traffic for non-tunneled packets.
Valid values range from 1 through 254.
vxlan |nvgre | gre | ipip | gtpc | gtpu
Specifies the tunnel types supported for tunneled traffic. For tunnel types IP address and masks are mapped to the outer header.
VNI and TEID are configured for the VXLAN and GTP-U tunnels, respectively. Valid values range from 1 through 4294967295.
  • VXLAN and NVGRE tunnels allow VNID and VSID values in the range of 1 through 16777215.
  • GTP-U and GTP-C tunnels allow tunnel ID values in the range of 1 through 4294967295.
src-ip | prefix-length | src-mask | dst-ip | prefix-length | dst-mask
Specifies the source IP address, source mask, destination IP address, and destination mask of the traffic.
IP addresses and IP masks display in hexadecimal format.
Instead of subnet mask, the subnet prefix length also can be specified.
sport |sport-end
Specifies the source port value. The valid values range is from 1 through 65535.
Provides matching based on sport range and sport range end parameters.
When specifying a range, source port value is mandatory.
Specifying the source port end value alone is not valid.
The source port value must be less than the sport port end.
dport |dport-end
Specifies the destination port. The valid values range is from 1 through 65535.
To match based on range, use the provided destination port value and the destination port end parameters.
The destination port value must be less than the destination port end value.
dscp
Specifies the type of service field for the IPv6 protocol. The valid values range is from 1 through 63.
length |length-end
Specifies the length of the IPv6 packets. The valid values range is from 64 to 9000.
To match based on length range, use the provided length and length-end parameters. The valid values range is from 65 through 9000.
When specifying range, length value is mandatory.
Specifying length-end alone is not valid.
Length must be less than the length-end.
push |sync | ack | cwr | ece |reset | fin |urg
Specifies the TCP protocol configuration.
vlan vlan-id
Specifies the VLAN ID. The valid values range is 0 through 4095.
morefragment | dontfragment
Specifies the fragment parameters.
count
Enables counters for the rule.
log
Enables the system log (syslog) for the rule.
qos-forwarding-group group-name
Specifies the name of a Quality of Service (QoS) forwarding group.

Modes

IP ACL config mode

Usage Guidelines

GRE tunnel-type:
  • Version-1 packets are not filtered with this setting.
  • Version-0 packets are filtered successfully with this setting.
The following specified length limitation applies to the sport-end and dport-end range length configuration.
Important

Important

If you configure an IPv4 or IPv6 ACL rule to match a specific IP length and also configure an IPv4 or IPv6 ACL with an overlapping IP length range, then the rule with specific length will not work.

IPvn rules configured with specified lengths that overlap IPvn length-range configurations fail silently.

Example 1. The IPv6 ACL rule in this example will not work because the rule with a specific length (bold font) overlaps the configured IP ACL range from 100 through 200. The rule with the overlapping specified length fails silently.

ip access-list v4acl
 seq 10 permit ip any 1.0.0.1 255.255.255.0 length 100 length-end 200

ipv6 access-list v6acl
 seq 10 permit ipv6 any bbbb::bbbb ffff::ffff length 150

Example 2. The IPv6 ACL rule (bold font) in this example will not work because the rule with a specific length overlaps the range from 100 through 200. The rule with the overlapping specified length fails silently.

ipv6 access-list v6acl
 seq 10 permit ipv6 any aaaa::aaaa ffff::ffff length 100 length-end 200
 seq 20 permit ipv6 any bbbb::bbbb ffff::ffff length 150

Example 3. This IPv6 ACL rule example will not work because in this configuration, because the rule with a specific length (bold font) overlaps the range from 100 through 200. The rule with the overlapping specified length fails silently.

ipv6 access-list v6acl-1
 seq 10 permit ipv6 any aaaa::aaaa ffff::ffff length 100 length-end 200

ipv6 access-list v6acl-2
 seq 10 permit ipv6 any bbbb::bbbb ffff::ffff length 150

Duplicate ACL rules are not allowed.

Conflicting ACL rules, rules with same match condition and different forwarding action are not allowed.

Examples

The following example configures an IPv6 ACL.

device# configure terminal
device(config)#ipv6 access-list ip6-acl
device(config-ip6-acl)# seq 1 permit 2000::1 FFFF::1 any any count log

device# show running-config access-list
ipv6 access-list ip6-acl
  seq 10 permit ipv6 2001::1 2001::0 2002::2 2002::0

device# show running-config ipv6 access-list all 
ipv6 access-list ip6-acl 
  seq 10 permit ipv6 2001::1 2001::0 2002::2 2002::0 

device# show running-config ipv6 access-list all 
ipv6 access-list ip6-acl 
  seq 10 permit ipv6 2001::1 2001::0 2002::2 2002::0