HP 6125G HP 6125G & 6125G/XG Blade Switches ACL and QoS Command Refere - Page 34

you con the timer range.

Page 34 highlights

View IPv6 basic ACL view Default level 2: System level Parameters rule-id: Specifies a rule ID, in the range of 0 to 65534. If no rule ID is provided when you create an ACL rule, the system automatically assigns it a rule ID. This rule ID takes the nearest higher multiple of the numbering step to the current highest rule ID, starting from 0. For example, if the rule numbering step is 5 and the current highest rule ID is 28, the rule is numbered 30. deny: Denies matching packets. permit: Allows matching packets to pass. counting: Counts the number of times the IPv6 ACL rule has been matched in hardware. fragment: Applies the rule only to non-first fragments. A rule without this keyword applies to both fragments and non-fragments. routing [ type routing-type ]: Matches a specific type of routing header or any type of routing header. The routing-type argument takes a value in the range of 0 to 255. If no routing header type is specified, the rule matches any type of routing header. source { ipv6-address prefix-length | ipv6-address/prefix-length | any }: Matches a source IP address. The ipv6-address and prefix-length arguments represent a source IPv6 address and address prefix length in the range of 1 to 128. The any keyword represents any IPv6 source address. time-range time-range-name: Specifies a time range for the rule. The time-range-name argument takes a case-insensitive string of 1 to 32 characters. It must start with an English letter. If the time range is not configured, the system creates the rule; however, the rule using the time range can take effect only after you configure the timer range. Description Use rule to create or edit an IPv6 basic ACL rule. You can edit ACL rules only when the match order is config. Use undo rule to delete an entire IPv6 basic ACL rule or some attributes in the rule. If no optional keywords are provided, you delete the entire rule. If optional keywords or arguments are provided, you delete the specified attributes. By default, an IPv6 basic ACL does not contain any rule. Within an ACL, the permit or deny statement of each rule must be unique. If the ACL rule you are creating or editing has the same deny or permit statement as another rule in the ACL, your creation or editing attempt will fail. To view rules in an ACL and their rule IDs, use the display acl ipv6 all command. Related commands: acl ipv6, display ipv6 acl, step, and time-range. NOTE: • If an IPv6 basic ACL is for QoS traffic classification, do not specify the fragment or routing keyword. The keyword can cause ACL application failure. The counting keyword (even if specified) does not take effect for QoS. • If an IPv6 basic ACL is for packet filtering, do not specify the fragment or routing keyword. 29

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104

29
View
IPv6 basic ACL view
Default level
2: System level
Parameters
rule-id
: Specifies a rule ID, in the range of 0 to 65534. If no rule ID is provided when you create an ACL
rule, the system automatically assigns it a rule ID. This rule ID takes the nearest higher multiple of the
numbering step to the current highest rule ID, starting from 0. For example, if the rule numbering step is
5 and the current highest rule ID is 28, the rule is numbered 30.
deny
: Denies matching packets.
permit
: Allows matching packets to pass.
counting
: Counts the number of times the IPv6 ACL rule has been matched in hardware.
fragment
: Applies the rule only to non-first fragments. A rule without this keyword applies to both
fragments and non-fragments.
routing
[
type
routing-type
]: Matches a specific type of routing header or any type of routing header. The
routing-type
argument takes a value in the range of 0 to 255. If no routing header type is specified, the
rule matches any type of routing header.
source
{
ipv6-address
prefix-length
|
ipv6-address
/
prefix-length
|
any
}: Matches a source IP address.
The
ipv6-address
and
prefix-length
arguments represent a source IPv6 address and address prefix length
in the range of 1 to 128. The
any
keyword represents any IPv6 source address.
time-range
time-range-name
: Specifies a time range for the rule. The
time-range-name
argument takes a
case-insensitive string of 1 to 32 characters. It must start with an English letter. If the time range is not
configured, the system creates the rule; however, the rule using the time range can take effect only after
you configure the timer range.
Description
Use
rule
to create or edit an IPv6 basic ACL rule. You can edit ACL rules only when the match order is
config.
Use
undo
rule
to delete an entire IPv6 basic ACL rule or some attributes in the rule. If no optional
keywords are provided, you delete the entire rule. If optional keywords or arguments are provided, you
delete the specified attributes.
By default, an IPv6 basic ACL does not contain any rule.
Within an ACL, the permit or deny statement of each rule must be unique. If the ACL rule you are creating
or editing has the same deny or permit statement as another rule in the ACL, your creation or editing
attempt will fail.
To view rules in an ACL and their rule IDs, use the
display acl ipv6 all
command.
Related commands:
acl ipv6
,
display ipv6 acl
,
step
, and
time-range
.
NOTE:
If an IPv6 basic ACL is for QoS traffic classification, do not specify the
fragment
or
routing
keyword. The
keyword can cause ACL application failure. The
counting
keyword (even if specified) does not take effect
for QoS.
If an IPv6 basic ACL is for packet filtering, do not specify the
fragment
or
routing
keyword.