Cisco ASA 5500 Series Configuration Guide using the CLI, 8.3
Adding an IPv6 Access List
Downloads: This chapterpdf (PDF - 136.0KB) The complete bookPDF (PDF - 20.75MB) | Feedback

Adding an IPv6 Access List

Table Of Contents

Adding an IPv6 Access List

Information About IPv6 Access Lists

Licensing Requirements for IPv6 Access Lists

Prerequisites for Adding IPv6 Access Lists

Guidelines and Limitations

Default Settings

Configuring IPv6 Access Lists

Task Flow for Configuring IPv6 Access Lists

Adding IPv6 Access Lists

Adding Remarks to Access Lists

Monitoring IPv6 Access Lists

Configuration Examples for IPv6 Access Lists

Where to Go Next

Feature History for IPv6 Access Lists


Adding an IPv6 Access List


This chapter describes how to configure IPv6 access lists to control and filter traffic through the adaptive security appliance.

This chapter includes the following sections:

Information About IPv6 Access Lists

Licensing Requirements for IPv6 Access Lists

Prerequisites for Adding IPv6 Access Lists

Guidelines and Limitations

Default Settings

Configuring IPv6 Access Lists

Monitoring IPv6 Access Lists

Configuration Examples for IPv6 Access Lists

Where to Go Next

Feature History for IPv6 Access Lists

Information About IPv6 Access Lists

The typical access list functionality in IPv6 is similar to access lists in IPv4. Access lists determine which traffic to block and which traffic to forward at router interfaces. Access lists allow filtering based upon source and destination addresses, inbound and outbound to specific interfaces. Each access list has an implicit deny statement at the end. You define IPv6 access lists and set their deny and permit conditions using the ipv6 access-list command with the deny and permit keywords in global configuration mode.

Licensing Requirements for IPv6 Access Lists

The following table shows the licensing requirements for this feature:

Model
License Requirement

All models

Base License.


Prerequisites for Adding IPv6 Access Lists

You should be familiar with IPv6 addressing and basic configuration. See the ipv6 commands in the Cisco Security Appliance Command Reference for more information about configuring IPv6.

Guidelines and Limitations

This section includes the guidelines and limitations for this feature.

Context Mode Guidelines

Supported in single and multiple context modes.

Firewall Mode Guidelines

Supported in routed and transparent firewall modes.

IPv6 Guidelines

Supports IPv6.

Additional Guidelines and Limitations

The following guidelines and limitations apply to IPv6 access lists:

The ipv6 access-list command allows you to specify whether an IPv6 address is permitted or denied access to a port or protocol. Each command is called an ACE. One or more ACEs with the same access list name are referred to as an access list. Apply an access list to an interface using the access-group command.

The adaptive security appliance denies all packets from an outside interface to an inside interface unless you specifically permit access using an access list. All packets are allowed by default from an inside interface to an outside interface unless you specifically deny access.

The ipv6 access-list command is similar to the access-list command, except that it is IPv6-specific. For additional information about access lists, refer to the access-list extended command.

The ipv6 access-list icmp command is used to filter ICMPv6 messages that pass through the adaptive security appliance.To configure the ICMPv6 traffic that is allowed to originate and terminate at a specific interface, use the ipv6 icmp command.

See the object-group command for information on how to configure object groups.

Possible operands for the operator option of the ipv6 access-list command include lt for less than, gt for greater than, eq for equal to, neq for not equal to, and range for an inclusive range. Use the ipv6 access-list command without an operator and port to indicate all ports by default.

ICMP message types are filtered by the access rule. Omitting the icmp_type argument indicates all ICMP types. If you specify ICMP types, the value can be a valid ICMP type number (from 0 to 255) or one of the following ICMP type literals:

destination-unreachable

packet-too-big

time-exceeded

parameter-problem

echo-request

echo-reply

membership-query

membership-report

membership-reduction

router-renumbering

router-solicitation

router-advertisement

neighbor-solicitation

neighbor-advertisement

neighbor-redirect

If the protocol argument is specified, valid values are icmp, ip, tcp, udp, or an integer in the range of 1 to 254, representing an IP protocol number.

Default Settings

Table 17-1 lists the default settings for IPv6 access list parameters.

Table 17-1 Default IPv6 Access List Parameters 

Parameters
Default

default

The default option specifies that a syslog message 106100 is generated for the ACE.

interval secs

Specifies the time interval at which to generate a 106100 syslog message; valid values are from 1 to 600 seconds. The default interval is 300 seconds. This value is also used as the timeout value for deleting an inactive flow.

level

The level option specifies the syslog level for message 106100; valid values are from 0 to 7. The default level is 6 (informational).

log

The log option specifies logging action for the ACE. If you do not specify the log keyword or you specify the log default keyword, then message 106023 is generated when a packet is denied by the ACE. If you specify the log keyword alone or with a level or interval, then message 106100 is generated when a packet is denied by the ACE. Packets that are denied by the implicit deny at the end of an access list are not logged. You must implicitly deny packets with an ACE to enable logging.


Configuring IPv6 Access Lists

This section includes the following topics:

Task Flow for Configuring IPv6 Access Lists

Adding IPv6 Access Lists

Adding Remarks to Access Lists

Task Flow for Configuring IPv6 Access Lists

Use the following guidelines to create and implement an access list:

Create an access list by adding an ACE and applying an access list name, as shown in the "Adding IPv6 Access Lists" section.

Apply the access list to an interface. (See the "Configuring Access Rules" section for more information.)

Adding IPv6 Access Lists

You can add a regular IPv6 access list or add an IPv6 access list with TCP.

To add a regular IPv6 access list, enter the following command:

Command
Purpose

ipv6 access-list id [line line-num] {deny | permit} {protocol | object-group protocol_obj_grp_id} {source-ipv6-prefix/prefix-length | any | host source-ipv6-address | object-group network_obj_grp_id} [operator {port [port] | object-group service_obj_grp_id}] {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address | object-group network_obj_grp_id} [{operator port [port] | object-group service_obj_grp_id}] [log [[level] [interval secs] | disable | default]]

Example:

hostname(config)# ipv6 access-list acl_grp permit tcp any host 3001:1::203:A0FF:FED6:162D

Configures an IPv6 access list.

The any keyword is an abbreviation for the IPv6 prefix ::/0, indicating any IPv6 address.

The deny keyword denies access if the conditions are matched.

The destination-ipv6-address argument identifies the IPv6 address of the host receiving the traffic.

The destination-ipv6-prefix argument identifies the IPv6 network address where the traffic is destined.

The disable option disables syslog messaging.

The host keyword indicates that the address refers to a specific host.

The id keyword specifies the number of an access list.

The line line-num option specifies the line number for inserting the access rule into the list. By default, the ACE is added to the end of the access list.

The network_obj_grp_id argument specifies existing network object group identification.

The object-group option specifies an object group.

The operator option compares the source IP address or destination IP address ports. For a list of permitted operands, see the "Guidelines and Limitations" section.

The permit keyword permits access if the conditions are matched.

The port option specifies the port that you permit or deny access. You can specify the port either by a number in the range of 0 to 65535 or by a literal name if the protocol is tcp or udp. For a list of permitted TCP or UDP literal names, see the "Guidelines and Limitations" section.

The prefix-length argument indicates how many of the high-order, contiguous bits of the address comprise the IPv6 prefix.

The protocol argument specifies the name or number of an IP protocol.

The protocol_obj_grp_id indicates the existing protocol object group ID.

The service_obj_grp_id option specifies the object group.

The source-ipv6-address specifies the address of the host sending traffic.

The source-ipv6-prefix specifies the IPv6 address of traffic origin.


To configure an IPv6 access list with ICMP, enter the following command:

Command
Purpose

ipv6 access-list id [line line-num] {deny | permit} icmp6 {source-ipv6-prefix/prefix-length | any | host source-ipv6-address | object-group network_obj_grp_id} {destination-ipv6-prefix/prefix-length | any | host destination-ipv6-address | object-group network_obj_grp_id} [icmp_type | object-group icmp_type_obj_grp_id] [log [[level] [interval secs] | disable | default]]

Example:

hostname(config)# ipv6 access list acl_grp permit tcp any host 3001:1::203:AOFF:FED6:162D

Configures an IPv6 access list with ICMP.

The icmp6 keyword specifies that the access rule applies to ICMPv6 traffic passing through the adaptive security appliance.

The icmp_type argument specifies the ICMP message type being filtered by the access rule. The value can be a valid ICMP type number from 0 to 255. (For a list of the permitted ICMP type literals, see the "Guidelines and Limitations" section.)

The icmp_type_obj_grp_id option specifies the object group ICMP type ID.

For details about additional ipv6 access-list command parameters, see the preceding procedure for adding a regular IPv6 access list, or see the ipv6 access-list command in the Cisco Security Appliance Command Reference.


Adding Remarks to Access Lists

You can include remarks about entries in any access list, including extended, EtherType, IPv6, standard, and Webtype access lists. The remarks make the access list easier to understand.

To add a remark after the last access-list command you entered, enter the following command:

Command
Purpose
access-list access_list_name remark text
Example:
hostname(config)# access-list OUT remark - 
this is the inside admin address
 
        

Adds a remark after the last access-list command you entered.

The text can be up to 100 characters in length. You can enter leading spaces at the beginning of the text. Trailing spaces are ignored.

If you enter the remark before any access-list command, then the remark is the first line in the access list.

If you delete an access list using the no access-list access_list_name command, then all the remarks are also removed.


Example

You can add remarks before each ACE, and the remarks appear in the access list in these locations. Entering a dash (-) at the beginning of a remark helps set it apart from an ACE.

hostname(config)# access-list OUT remark - this is the inside admin address
hostname(config)# access-list OUT extended permit ip host 209.168.200.3 any
hostname(config)# access-list OUT remark - this is the hr admin address
hostname(config)# access-list OUT extended permit ip host 209.168.200.4 any

Monitoring IPv6 Access Lists

To monitor IPv6 access lists, perform one of the following tasks:

Command
Purpose
show ipv6 access-list

Displays all IPv6 access list information.


Configuration Examples for IPv6 Access Lists

The following example shows how to configure IPv6 access lists:

The following example allows any host using TCP to access the 3001:1::203:A0FF:FED6:162D server:

hostname(config)# ipv6 access-list acl_grp permit tcp any host 3001:1::203:A0FF:FED6:162D
 
   

The following example uses eq and a port to deny access to just FTP:

hostname(config)# ipv6 access-list acl_out deny tcp any host 3001:1::203:A0FF:FED6:162D eq 
ftp 
hostname(config)# access-group acl_out in interface inside
 
   

The following example uses lt to permit access to all ports less than port 2025, which permits access to the well-known ports (1 to 1024):

hostname(config)# ipv6 access-list acl_dmz1 permit tcp any host 3001:1::203:A0FF:FED6:162D 
lt 1025
hostname(config)# access-group acl_dmz1 in interface dmz1

Where to Go Next

Apply the access list to an interface. (See the "Configuring Access Rules" section for more information.)

Feature History for IPv6 Access Lists

Table 17-2 lists the release history for this feature.

Table 17-2 Feature History for IPv6 Access Lists

Feature Name
Releases
Feature Information

IPv6 access lists

7.0(1)

The following command was introduced: ipv6 access-list.