seq
(rules in IPv6 extended ACLs)
Inserts filtering rules in IPv6 extended
ACLs.
Syntax
seq
seq-value
{
permit
|
deny
|
hard-drop
}
ip-protocol
{
any
|
S_IPaddress
/
prefix_len
|
host
S_IPaddress
}
[
source-operator
[
S_port-numbers
]
]
[
tcp/udp-flags
]
[
vlan
vlanID
]
[
count
]
[
log
]
[
mirror
]
[
copy-sflow
]
[
connlimit
connlimit-value
]
{
permit
|
deny
|
hard-drop
}
ip-protocol
{
any
|
S_IPaddress
/
prefix_len
|
host
S_IPaddress
}
[
source-operator
[
S_port-numbers
]
]
[
tcp/udp-flags
]
[
vlan
vlanID
]
[
count
]
[
log
]
[
mirror
]
[
copy-sflow
]
[
connlimit
connlimit-value
]
no
{
permit
|
deny
|
hard-drop
}
ip-protocol
{
any
|
S_IPaddress
/
prefix_len
|
host
S_IPaddress
}
[
source-operator
[
S_port-numbers
]
]
[
tcp/udp-flags
]
[
vlan
vlanID
]
[
count
]
[
log
]
[
mirror
]
[
copy-sflow
]
[
connlimit
connlimit-value
]
Parameters
- seq
- (Optional) Enables you to
assign a sequence number to the rule. If you do not specify seq
seq-value, the
rule is added at the end of the list.
- seq-value
- Valid values
range from 1 through 65535.
- permit
- Specifies rules to permit
traffic.
- deny
- Specifies rules to deny
traffic.
-
hard-drop
- Overrides the trap behavior
for control frames. However, hard-drop does
not override a permit for this address in a preceding rule.
- ip-protocol
- Indicates the type of IP
packet you are filtering. The options are as follows:
- <0-255>
- Protocol number
custom value from 0 through 255.
- ipv6-icmp
- Internet Control
Message Protocol
- ipv6
- Any IP protocol
- tcp
- Transmission
Control Protocol
- udp
- User Datagram
Protocol
- any
- Specifies all source
addresses.
- S_IPaddress
- Specifies a source address
for which you want to filter the subnet. For options to abbreviate the
address, see the Usage Guidelines.
- prefix_len
- Indicates how
many of the high-order, contiguous bits of the address comprise
the IPv6 prefix.
- host
- Specifies a source address.
- S_IPaddress
- The specific
address. For options to abbreviate the address, see the Usage
Guidelines.
- source-operator
- If you specified tcp or udp
ip-protocol, the following optional operators are
available:
- eq
- The policy
applies to the TCP or UDP port name or number you enter after
eq.
- gt
- The policy
applies to TCP or UDP port numbers equal to or greater than the
port number or the numeric equivalent of the port name you enter
after gt.
- lt
- The policy
applies to TCP or UDP port numbers that are equal to or less
than the port number or the numeric equivalent of the port name
you enter after lt.
- neq
- The policy
applies to all TCP or UDP port numbers except the port number or
port name you enter after neq.
- range
- The policy
applies to all TCP or UDP port numbers that are between the
first TCP or UDP port name or number and the second one you
enter following the range keyword. The range includes the port names
or numbers you enter. For example, to apply the policy to all
ports between and including 23 (Telnet) and 53 (DNS), enter the
following: range 23 53 (two values separated by a space). The
first port number in the range must be lower than the last
number in the range.
- S_port-numbers
- (Valid only when ip-protocol is UDP or TCP) Specify one or more port numbers.
- drop-precedence-force
dp-value
- In permit rules
applied to incoming traffic, forces drop precedence to a value of 0 through
2. On SLX 9540 or SLX 9640 devices,
the drop-precedence-force
keyword is supported only under the default,
vxlan-ext, and bgp-flowspec
TCAM profiles.
- vlan
vlanID
- Specifies a VLAN interface to
which the ACL is bound.
- tcp/udp-flags
- If you specify tcp or udp
ip-protocol, one or more of the following flags are
available:
- ack
- Filters packets
for which the ack
(acknowledge) flag is set.
- fin
- Filters packets
for which the fin
(finish) flag is set.
- rst
- Filters packets
for which the rst
(reset) flag is set.
- sync
- Filters packets
for which the syn
(synchronize) flag is set.
- urg
- Filters packets
for which the urg
(urgent) flag is set.
- push
- Filters packets
for which the psh
(push) flag is set.
- count
- Enables statistics for the
rule.
- log
- Enables inbound logging for
the rule. In addition, the ACL log buffer must be enabled, using the
debug
access-list-log buffer command.
- mirror
- (Supported for rules in ACLs
applied on physical interfaces to inbound traffic. Not supported for PBR,
rACLs, or ACL-RL.) Mirrors packets matching the rule.
- copy-sflow
- For incoming traffic, sends
matching packets to the sFlow collector.
-
connlimit connlimit-value
- Number of connections allowed per IP address.
Modes
ACL configuration mode
Usage Guidelines
IPv6 extended ACLs permit or deny traffic according to source address, as well as
other parameters.
An IPv6 ACL can only be applied to
incoming traffic.
IPv6 filtering by destination address
is not supported.
The order of the rules in an ACL is
critical, because the first matching rule stops further processing. When you create
rules, specify the sequence values to determine the order of rule processing. If you
do not specify a sequence value, the rule is added to the end of the list.
You can abbreviate an IPv6 address by
using one or more of the following rules:
- Remove one or more leading zeros
from one or more groups of hexadecimal digits, usually for all or none of
the leading zeros. (For example, convert the group 0042 to 42.)
- Omit consecutive sections of
zeros, using a double colon (::) to denote the omitted sections. The double
colon is used only once in any given address. The address would be
indeterminate if the double colon were used multiple times. A double colon
cannot be used to denote one omitted section of zeros. (For example,
2001:db8::1:2 is valid, but 2001:db8::1::2 or 2001:db8::1:1:1:1:1 is not
permitted.)
Although in an extended-ACL rule you can include
log,
mirror, and
copy-sflow, only one of
the three is processed, as follows:
- In a permit rule, the order of
precedence is mirror > copy-sflow >
log.
- In a deny or hard-drop rule, the
order of precedence is log >
copy-sflow > mirror.
To delete a rule from an ACL, do the
relevant of the following:
- If you know the rule number,
enter no
seq
seq-value.
- If you do not know the rule
number, type no
followed by the full syntax except for seq
seq-value.
Filtering fragmented or non-fragmented packets is only supported on ingress ACLs.
For IPv6 frames, filtering is only supported if the fragment is the first extension
header. Use protocol number 44
for fragmented extension header. ACL filtering of fragmented and non-fragmented
packets is not supported on SLX 9150 and SLX 9250 devices.
Examples
The following example creates an
IPv6 extended ACL, defines a rule for it, and applies the ACL to an interface.
device# configure
device(config)# ipv6 access-list extended ip_acl_1
device(conf-ip6acl-ext)# seq 10 deny ipv6 2001:2002:1234:1::/64 2001:1001:1234:1::/64 count
device(conf-ip6acl-ext)# exit
device(config)# interface ethernet 0/5
device(conf-if-eth-0/5)# ipv6 access-group ip_acl_1 in
The following example creates an
IPv6 extended ACL, defines rules in the ACL, and applies it as a receive-path
ACL (rACL).
device(config)# ipv6 access-list extended ipv6-receive-acl-example
device(conf-ip6acl-ext)# hard-drop tcp host 10::1 any count
device(conf-ip6acl-ext)# hard-drop udp any host 20::1 count
device(conf-ip6acl-ext)# permit tcp host 10::2 any eq telnet count
device(conf-ip6acl-ext)# permit tcp host 10::2 any eq bgp count
device(conf-ip6acl-ext)# hard-drop tcp host 10::3 host ff02::1 count
device(conf-ip6acl-ext)# exit
device(config)# ipv6 receive access-group ipv6-receive-acl-example
The following example creates an IPv6 extended ACL for
permitting fragmented packets.
device(config)# ipv6 access-list extended ipv6-receive-acl-example
device(conf-ip6acl-ext)# seq 10 permit 44 any any count