Cisco Cisco Packet Data Gateway (PDG)
IPv6 ACL Configuration Mode Commands
deny/permit (by source IP address masking) ▀
Command Line Interface Reference, StarOS Release 17 ▄
6605
deny
: Indicates the rule, when matched, drops the corresponding packets.
permit
: Indicates the rule, when matched, allows the corresponding packets.
log
Default: packets are not logged.
Indicates all packets which match the filter are to be logged.
Indicates all packets which match the filter are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then
be configured using the
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then
be configured using the
source_wildcard
parameter.
source_wildcard
This option is used in conjunction with the
source_address
option to specify a group of addresses for
which packets are to be filtered.
The mask must be entered as a complement:
The mask must be entered as a complement:
Zero-bits in this parameter mean that the corresponding bits configured for the
source_address
parameter must be identical.
One-bits in this parameter mean that the corresponding bits configured for the
source_address
parameter must be ignored.
Important:
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
Usage
Define a rule when any packet from the IP addresses which fall into the group of addresses matching the IP
address masking. This allows the reduction of filtering rules as it does not require a rule for each source and
destination pair.
address masking. This allows the reduction of filtering rules as it does not require a rule for each source and
destination pair.
Important:
The maximum number of rules that can be configured per ACL varies depending on how the ACL is
to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide.
Example
The following command defines two rules with the second logging filtered packets:
permit 2001:4A2B::1f3F
deny log 2001:4A2B::1f3F
The following sets the insertion point to before the first rule defined above:
before permit 2001:4A2B::1f3F
The following command sets the insertion point after the second rule defined above:
after deny log 2001:4A2B::1f3F