- IGMP Profile Configuration Mode Commands
- IKEv2 Security Association Configuration Mode Commands
- IMEI Profile Configuration Mode
- IMEI-TAC-Group Configuration Mode Commands
- IMS Authorization Service Configuration Mode Commands
- IMS Sh Service Configuration Mode Commands
- IPMS Client Configuration Mode Commands
- IPNE Endpoint Configuration Mode Commands
- IPNE Service Configuration Mode Commands
- IPSec Transform Set Configuration Mode Commands
- IPSG RADIUS Snoop Configuration Mode Commands
- IPSG RADIUS Server Configuration Mode Commands
- IPSP Configuration Mode Commands
- IPv6 ACL Configuration Mode Commands
- IPv6 to IPv4 Tunnel Interface Configuration Mode Commands
- IP VRF Context Configuration Mode Commands
- ISAKMP Configuration Mode Commands
- IuPS Service Configuration Mode Commands
- LAC Service Configuration Mode Commands
- Line Configuration Mode Commands
- Link Configuration Mode Commands
- Linkset Configuration Mode Commands
- LMA Service Configuration Mode Commands
- LNS Service Configuration Mode Commands
- Local Policy Actiondef Configuration Mode Commands
- Local Policy Eventbase Configuration Mode Commands
- Local Policy Ruledef Configuration Mode Commands
- Local Policy Service Configuration Mode Commands
- Location Service Configuration Mode Commands
- Logical eNode Configuration Mode Commands
- Loopback Interface Configuration Mode Commands
- LTE Custom TAI List Configuration Mode Commands
- LTE Emergency Profile Configuration Mode Commands
- LTE Forbidden Location Area Configuration Mode Commands
- LTE Forbidden Tracking Area Configuration Mode Commands
- LTE Foreign PLMN GUTI Management Database Configuration Mode Commands
- LTE HeNBGW MME Pool Configuration Mode Commands
- LTE Handover Restriction List Configuration Mode Commands
- LTE MME HeNB-GW Management Database Configuration Mode Commands
- LTE Network Global MME ID Management Database Configuration Mode Commands
- LTE Paging Map Configuration Mode Commands
- LTE Paging Profile Configuration Mode Commands
- LTE Peer Map Configuration Mode Commands
- LTE Policy Configuration Mode Commands
- LTE Subscriber Map Configuration Mode Commands
- LTE TAI Management Database Configuration Mode Commands
- LTE TAI Management Object Configuration Mode Commands
- MAG Service Configuration Mode Commands
- MAP Service Configuration Mode Commands
- MIP HA Assignment Table Configuration Mode Commands
- MPLS-LDP Configuration Mode Commands
- MIPv6 HA Service Configuration Mode Commands
- MME-eMBMS Service Configuration Mode Commands
- MME LAC Pool Area Configuration Mode Commands
- MME MSC Pool Area Configuration Mode
- MME SGs Service Configuration Mode Commands
- MME Service Configuration Mode Commands
- MPLS-IP Configuration Mode Commands
- MRME Service Configuration Mode Commands
- Network Service Entity- IP Local Configuration Mode Commands
- Network Service Entity - Peer NSEI Configuration Mode Commands
- Network Service Virtual Connection Configuration Mode Commands
- Network Service Virtual Link Configuration Mode Commands
- NTP Configuration Mode Commands
- NTSR Pool Configuration Mode Commands
- Operator Policy Configuration Mode
- ORBEM Configuration Mode Commands
- OSPF Configuration Mode Commands
- OSPFv3 Configuration Mode Commands
- OSPF VRF Configuration Mode Commands
- Out-Address Configuration Mode Commands
- P2P Advertisement Server Group Configuration Mode Commands
- PCC-Action-Set Configuration Mode Commands
- PCC-AF-Service Configuration Mode Commands
- PCC-Condition-Group Configuration Mode Commands
- PCC-Data-Service Configuration Mode Commands
- PCC-Event-Notification-Interface-Endpoint Configuration Mode Commands
- PCC-Policy-Service Configuration Mode Commands
- PCC-Service-Profile Configuration Mode Commands
- PCC-QoS-Profile Configuration Mode Commands
- PCC-Quota Service Configuration Mode Commands
- PCC-Sp-Endpoint Configuration Mode Commands
- PCC-Service Addon Configuration Mode Commands
- PCC-TimeDef Configuration Mode Commands
- PCP Configuration Mode Commands
- PCP Policy Control Configuration Mode Commands
- PDIF Service Configuration Mode Commands
- PDG Service Configuration Mode Commands
- PDSN Service Configuration Mode Commands
- PDSN Service RoHC Configuration Mode Commands
- Peer List Configuration Mode Commands
- Peer Profile Configuration Mode Commands
- Peer-Server Configuration Mode Commands
- P-GW Service Configuration Mode Commands
- Policy Control Configuration Mode Commands
- Plugin Configuration Mode Commands
- PVC Configuration Mode Commands
- PVC Interface Configuration Mode Commands
- QCI - QoS Mapping Configuration Mode Commands
- QCI - RAN ID Mapping Configuration Mode Commands
- QoS L2 Mapping Configuration Mode Commands
- QoS Profile Configuration Mode Commands
- Index
- deny/permit (by source IP address masking)
- deny/permit (any)
- deny/permit (by host IP address)
- deny/permit (by source ICMP packets)
- deny/permit(by IP packets)
- deny/permit (by TCP/UDP packets)
- end
- exit
- readdress server
- redirect context (by IP address masking)
- redirect context (any)
- redirect context (by host IP address)
- redirect context (by source ICMP packets)
- redirect context (by IP packets)
- redirect context (by TCP/UDP packets)
- redirect css delivery-sequence
- redirect css service (any)
- redirect css service (by host IP address)
- redirect css service (by ICMP packets)
- redirect css service (by IP packets)
- redirect css service (by source IP address masking)
- redirect css service (by TCP/UDP packets)
- redirect css service (for downlink, any)
- redirect css service (for downlink, by host IP address)
- redirect css service (for downlink, by ICMP packets)
- redirect css service (for downlink, by IP packets)
- redirect css service (for downlink, by source IP address masking)
- redirect css service (for downlink, by TCP/UDP packets)
- redirect css service (for uplink, any)
- redirect css service (for uplink, by host IP address)
- redirect css service (for uplink, by ICMP packets)
- redirect css service (for uplink, by IP packets)
- redirect css service (for uplink, by source IP address masking)
- redirect css service (for uplink, by TCP/UDP packets)
- redirect nexthop (by IP address masking)
- redirect nexthop (any)
- redirect nexthop (by host IP address)
- redirect nexthop (by source ICMP packets)
- redirect nexthop (by IP packets)
- redirect nexthop (by TCP/UDP packets)
IPv6 ACL Configuration
Mode Commands
The IPv6 Access Control List Configuration Mode is used to create and manage IPv6 access privileges.
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
The commands or keywords/variables that are available are dependent on platform type, product version, and installed license(s).
- deny/permit (by source IP address masking)
- deny/permit (any)
- deny/permit (by host IP address)
- deny/permit (by source ICMP packets)
- deny/permit (by IP packets)
- deny/permit (by TCP/UDP packets)
- end
- exit
- readdress server
- redirect context (by IP address masking)
- redirect context (any)
- redirect context (by host IP address)
- redirect context (by source ICMP packets)
- redirect context (by IP packets)
- redirect context (by TCP/UDP packets)
- redirect css delivery-sequence
- redirect css service (any)
- redirect css service (by host IP address)
- redirect css service (by ICMP packets)
- redirect css service (by IP packets)
- redirect css service (by source IP address masking)
- redirect css service (by TCP/UDP packets)
- redirect css service (for downlink, any)
- redirect css service (for downlink, by host IP address)
- redirect css service (for downlink, by ICMP packets)
- redirect css service (for downlink, by IP packets)
- redirect css service (for downlink, by source IP address masking)
- redirect css service (for downlink, by TCP/UDP packets)
- redirect css service (for uplink, any)
- redirect css service (for uplink, by host IP address)
- redirect css service (for uplink, by ICMP packets)
- redirect css service (for uplink, by IP packets)
- redirect css service (for uplink, by source IP address masking)
- redirect css service (for uplink, by TCP/UDP packets)
- redirect nexthop (by IP address masking)
- redirect nexthop (any)
- redirect nexthop (by host IP address)
- redirect nexthop (by source ICMP packets)
- redirect nexthop (by IP packets)
- redirect nexthop (by TCP/UDP packets)
deny/permit (by source IP address masking)
Used to filter subscriber sessions based on the IPv6 address mask sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
{ deny | permit } [ log ] source_address source_wildcard after { deny | permit } [ log ] source_address source_wildcard before { deny | permit } [ log ] source_address source_wildcard no { deny | permit } [ log ] source_address source_wildcard
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change
no
Removes the rule which exactly matches the options specified.
deny | permit
Specifies the rule is either block (deny) or an allow (permit) filter.
-
deny: Indicates the rule, when matched, drops the corresponding packets.
-
permit: Indicates the rule, when matched, allows the corresponding packets.
log
Default: packets are not logged.
Indicates all packets which match the filter are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
Usage Guidelines
Define a rule when any packet from the IP addresses which fall into the group of addresses matching the IP address masking. This allows the reduction of filtering rules as it does not require a rule for each source and destination pair.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide.
Examples
permit 2001:4A2B::1f3F deny log 2001:4A2B::1f3F
before permit 2001:4A2B::1f3F
after deny log 2001:4A2B::1f3F
no permit 2001:4A2B::1f3F
deny/permit (any)
Used to filter subscriber sessions based on any packet received. This command is also used to set the access control list insertion point.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
{ deny | permit } [ log ] any after { deny | permit } [ log ] any before { deny | permit } [ log ] any no { deny | permit } [ log ] any
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
deny | permit
Specifies the rule is either block (deny) or an allow (permit) filter.
-
deny: Indicates the rule, when matched, drops the corresponding packets.
-
permit: Indicates the rule, when matched, allows the corresponding packets.
log
Default: packets are not logged.
Indicates all packets which match the filter are to be logged.
any
Indicates all packets will match the filter regardless of source and/or destination.
Usage Guidelines
Define a catch all rule to place at the end of the list of rules.
It is suggested that any rule which is added to be a catch all should also have the log option specified. The logged packets may be used to determine if the current list of rules is adequate or needs modification to ensure proper security. The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide.
Examples
permit any deny log any
before permit any
after deny log any
no permit any
deny/permit (by host IP address)
Used to filter subscriber sessions based on the targeted host IP address sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
{ deny | permit } [ log ] host source_host_address after { deny | permit } [ log ] host source_host_address before { deny | permit } [ log ] host source_host_address no { deny | permit } [ log ] host source_host_address
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
deny | permit
Specifies the rule is either block (deny) or an allow (permit) filter.
-
deny: Indicates the rule, when matched, drops the corresponding packets.
-
permit: Indicates the rule, when matched, allows the corresponding packets.
log
Default: packets are not logged.
Indicates all packets which match the filter are to be logged.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon notation.
Usage Guidelines
Define a rule when a very specific remote host is to be blocked. In simplified networks where the access controls need only block a few hosts, this command allows the rules to be very clear and concise.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide.
Examples
permit host 2001:4A2B::1f3F deny log host 2001:4A2B::1f3F
before permit host 2001:4A2B::1f3F
after deny log host 2001:4A2B::1f3F
no permit host 2001:4A2B::1f3F
deny/permit (by source ICMP packets)
Used to filter subscriber sessions based on the internet control message protocol packets sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
{ deny | permit } [ log ] icmp { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ icmp_type [ icmp_code ] ] after { deny | permit } [ log ] icmp { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ icmp_type [ icmp_code ] ] before { deny | permit } [ log ] icmp { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ icmp_type [ icmp_code ] ] no { deny | permit } [ log ] icmp { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ icmp_type [ icmp_code ] ]
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
deny | permit
Specifies the rule is either block (deny) or an allow (permit) filter.
-
deny: Indicates the rule, when matched, drops the corresponding packets.
-
permit: Indicates the rule, when matched, allows the corresponding packets.
log
Default: packets are not logged.
Indicates all packets which match the filter are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
any
Specifies that the rule applies to all packets.
host
Specifies that the rule applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 hexadecimal-colon-separated notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 hexadecimal-colon-separated notation.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
icmp_type
Specifies that all ICMP packets of a particular type are to be filtered. The type is an integer from 0 through 255.
icmp_code
Specifies that all ICMP packets of a particular code are to be filtered. The type is an integer from 0 through 255.
Usage Guidelines
Define a rule to block ICMP packets which can be used for address resolution and possible be a security risk.
The IP filtering allows flexible controls for pairs of individual hosts or groups by IP masking which allows the filtering of entire subnets if necessary.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide.
Examples
permit icmp host 2001:4A2B::1f3F4 any 168 deny log icmp 2001:4A2B::1f3F 2001:4a2b::1f00 host fe80::a02:410 168 11
before permit icmp host 2001:4A2B::1f3F any 168
after deny log icmp 2001:4A2B::1f3F 2001:4a2b::1f00 host fe80::a02:410 168 11
no permit icmp host 2001:4A2B::1f3F any 168
deny/permit (by IP packets)
Used to filter subscriber sessions based on the internet protocol packets sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
{ deny | permit } [ log ] ip { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ fragment ] [ protocolnum ] after { deny | permit } [ log ] ip { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ fragment ] [ protocolnum ] before { deny | permit } [ log ] ip { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ fragment ] [ protocolnum ] no { deny | permit } [ log ] ip { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ fragment ] [ protocolnum ]
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
deny | permit
Specifies the rule is either block (deny) or an allow (permit) filter.
deny: indicates the rule, when matched, drops the corresponding packets.
permit: indicates the rule, when matched, allows the corresponding packets.
log
Default: packets are not logged.
Indicates all packets which match the filter are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore, allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.
any
Specifies that the rule applies to all packets.
host
Specifies that the rule applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon notation.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
fragment
Indicates packet filtering is to be applied to IP packet fragments only.
protocol num
Indicates that the packet filtering is to be applied to a specific protocol number.
num can be any integer ranging from 0 to 255.
Usage Guidelines
Block IP packets when the source and destination are of interest.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide.
Examples
permit ip host 2001:4A2B::1f3F any fragment deny log ip 2001:4A2B::1f3F 2001:4a2b::1f00 host fe80::a02:410
before permit ip host 2001:4A2B::1f3F any fragment
after deny log ip 2001:4A2B::1f3F 2001:4a2b::1f00 host fe80::a02:410
no permit ip host 2001:4A2B::1f3F any fragment
deny/permit (by TCP/UDP packets)
Used to filter subscriber sessions based on the transmission control protocol/user datagram protocol packets sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
{ deny | permit } [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dst_port ] } after { deny | permit } [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dst_port ] } before { deny | permit } [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dst_port ] } no { deny | permit } [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dst_port ] }
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
deny | permit
Specifies the rule is either block (deny) or an allow (permit) filter.
-
deny: Indicates the rule, when matched, drops the corresponding packets.
-
permit: Indicates the rule, when matched, allows the corresponding packets.
log
Default: packets are not logged.
Indicates all packets which match the filter are to be logged.
tcp | udp
Specifies the filter is to be applied to IP-based transmission control protocol or the user datagram protocol.
-
tcp: Filter applies to TPC packets.
-
udp: Filter applies to UDP packets.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
any
Specifies that the rule applies to all packets.
host
Specifies that the rule applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
eq source_port
Specifies a single, specific source TCP port number to be filtered.
source_port must be configured to an integer from 0 through 65535.
gt source_port
Specifies that all source TCP port numbers greater than the one specified are to be filtered.
source_port must be configured to an integer from 0 through 65535.
lt source_port
Specifies that all source TCP port numbers less than the one specified are to be filtered.
source_port must be configured to an integer from 0 through 65535.
neq source_port
Specifies that all source TCP port numbers not equal to the one specified are to be filtered.
source_port must be configured to an integer from 0 through 65535.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
eq dest_port
Specifies a single, specific destination TCP port number to be filtered.
dest_port must be configured to an integer from 0 through 65535.
gt dest_port
Specifies that all destination TCP port numbers greater than the one specified are to be filtered.
dest_port must be configured to an integer from 0 through 65535.
lt dest_port
Specifies that all destination TCP port numbers less than the one specified are to be filtered.
dest_port must be configured to an integer from 0 through 65535.
neq dest_port
Specifies that all destination TCP port numbers not equal to the one specified are to be filtered.
dest_port must be configured to an integer from 0 through 65535.
Usage Guidelines
Block IP packets when the source and destination are of interest but for only a limited set of ports.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide.
Examples
permit tcp host 2001:4A2B::1f3F any deny log udp 2001:4A2B::1f3F 2001:4a2b::1f00 host fe80::a02:410 permit tcp host 2001:4A2B::1f3F gt 1023 any
before permit tcp host 2001:4A2B::1f3F any
after deny log udp 2001:4A2B::1f3F 2001:4a2b::1f00 host fe80::a02:410
no permit tcp host 2001:4A2B::1f3F gt 1023 any
end
Exits the current configuration mode and returns to the Exec mode.
Product
All
Privilege
Security Administrator, Administrator
Syntax
Syntax Description
end
Usage Guidelines
Use this command to return to the Exec mode.
exit
Exits the current mode and returns to the parent configuration mode.
Product
All
Privilege
Security Administrator, Administrator
Syntax
Syntax Description
exit
Usage Guidelines
Use this command to return to the parent configuration mode.
readdress server
Alter the destination address and port number in TCP or UDP packet headers to redirect packets to a different server.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
readdress server redirect_address [ port port_number ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dst_port ] } after readdress server redirect_address [ port port_no ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dst_port ] } before readdress server redirect_address [ port port_no ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dst_port ] } no readdress server redirect_address [ port port_number ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dst_port ] }
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
redirect_address
The IP address to which the IP packets are redirected. TCP or UDP packet headers are rewritten to contain the new destination address. This must expressed in IPv6 colon-separated-hexadecimal notation.
port port_number
The number of the port at the redirect address where the packets are sent. TCP or UDP packet headers are rewritten to contain the new destination port number.
tcp | udp
Specifies the redirect is to be applied to the IP-based transmission control protocol or the user datagram protocol.
-
tcp: Redirect applies to TCP packets.
-
udp: Redirect applies to UDP packets.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
any
Specifies that the rule applies to all packets.
host
Specifies that the rule applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
eq source_port
Specifies a single, specific source TCP port number to be filtered.
source_port must be configured to an integer from 0 through 65535.
gt source_port
Specifies that all source TCP port numbers greater than the one specified are to be filtered.
source_port must be configured to an integer from 0 through 65535.
lt source_port
Specifies that all source TCP port numbers less than the one specified are to be filtered.
source_port must be configured to an integer from 0 through 65535.
neq source_port
Specifies that all source TCP port numbers not equal to the one specified are to be filtered.
source_port must be configured to an integer from 0 through 65535.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
eq dest_port
Specifies a single, specific destination TCP port number to be filtered.
dest_port must be configured to an integer from 0 through 65535.
gt dest_port
Specifies that all destination TCP port numbers greater than the one specified are to be filtered.
dest_port must be configured to an integer from 0 through 65535.
lt dest_port
Specifies that all destination TCP port numbers less than the one specified are to be filtered.
dest_port must be configured to an integer from 0 through 65535.
neq dest_port
Specifies that all destination TCP port numbers not equal to the one specified are to be filtered.
dest_port must be configured to an integer from 0 through 65535.
Usage Guidelines
Use this command to define a rule that redirects packets to a different destination address. The TCP and UDP packet headers are modified with the new destination address and destination port.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
readdress server fe80::c0a8:a04 udp any any
before readdress server fe80::c0a8:a04 udp any any
no readdress server fe80::c0a8:a04 udp any any
redirect context (by IP address masking)
Used to redirect subscriber sessions based on the IP address mask sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect context context_id [ log ] source_address source_wildcard after redirect context context_id [ log ] source_address source_wildcard before redirect context context_id [ log ] source_address source_wildcard no redirect context context_id [ log ] source_address source_wildcard
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
context context_id
Specifies the context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
source_address
Filters by the IP address(es) from which the packet originated. This option filters all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
Filters packets for a group of addresses specified in conjunction with the source_address option.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
Usage Guidelines
Define a rule when any packet from the IP addresses which fall into the group of addresses matching the IP address masking. This allows the reduction of redirect rules as it does not require a rule for each source and destination pair.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect context 23 2002::c6a2:1600 2002::c6a2:1600
before redirect context 23 2002::c6a2:1600 2002::c6a2:1600
after redirect context 23 2002::c6a2:1600 2002::c6a2:1600
no redirect context 23 2002::c6a2:1600 2002::c6a2:1600
redirect context (any)
Used to redirect subscriber sessions based on any packet received. This command is also used to set the access control list insertion point.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect context context_id [ log ] any after redirect context context_id [ log ] any before redirect context context_id [ log ] any no redirect context context_id [ log ] any
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
context context_id
The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
any
Indicates all packets will match the redirect regardless of source and/or destination.
Usage Guidelines
Define a catch all rule to place at the end of the list of rules to provide explicit handling of rules which do not fit any other criteria.
It is suggested that any rule which is added to be a catch all should also have the log option specified. The logged packets may be used to determine if the current list of rules is adequate or needs modification to ensure proper security. The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect context 23 any
before redirect context 23 any
after redirect context 23 any
no redirect context 23 any
redirect context (by host IP address)
Used to redirect subscriber sessions based on the targeted host IP address sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect context context_id [ log ] host source_ip_address after redirect context context_id [ log ] host source_ip_address before redirect context context_id [ log ] host source_ip_address no redirect context context_id [ log ] host source_ip_address
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
context context_id
The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
host
Specifies that the rule applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
Usage Guidelines
Define a rule when a very specific remote host is to be blocked. In simplified networks where the access controls need only block a few hosts, this command allows the rules to be very clear and concise.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect context 23 host fe80::c0a8:c80b
before redirect context 23 host fe80::c0a8:c80b
after redirect context 23 host fe80::c0a8:c80b
no redirect context 23 host fe80::c0a8:c80b
redirect context (by source ICMP packets)
Used to redirect subscriber sessions based on the internet control message protocol packets sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect context context_id [ log ] icmp { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ icmp_type [ icmp_code ] ] after redirect context context_id [ log ] icmp { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ icmp_type [ icmp_code ] ] before redirect context context_id [ log ] icmp { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ icmp_type [ icmp_code ] ] no redirect context context_id [ log ] icmp { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ icmp_type [ icmp_code ] ]
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
context context_id
The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
any
Specifies that the rule applies to all packets.
host
Specifies that the rule applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
icmp_type
Specifies that all ICMP packets of a particular type are to be filtered. Type is an integer from 0 through 255.
icmp_code
Specifies that all ICMP packets of a particular code are to be filtered type is an integer from 0 through 255.
Usage Guidelines
Define a rule to block ICMP packets which can be used for address resolution and possibly be a security risk.
The IP redirecting allows flexible controls for pairs of individual hosts or groups by IP masking which allows the redirecting of entire subnets if necessary.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect context 23 icmp host 2002::c6a2:6419
before redirect context 23 icmp host 2002::c6a2:6419
after redirect context 23 icmp host 2002::c6a2:6419
no redirect context 23 icmp host 2002::c6a2:6419
redirect context (by IP packets)
Used to redirect subscriber sessions based on the internet protocol packets sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect context context_id [ log ] ip { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ fragment ] [ protocol num ] after redirect context context_id [ log ] ip { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ fragment ] [ protocol num ] before redirect context context_id [ log ] ip { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ fragment ] [ protocol num ] no redirect context context_id [ log ] ip { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ fragment ] [ protocol num ]
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
context context_id
The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
any
Specifies that the rule applies to all packets.
host
Specifies that the rule applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
fragment
Indicates packet redirection is to be applied to IP packet fragments only.
protocol num
Indicates that the packet filtering is to be applied to a specific protocol number.
num is an integer from 0 through 255.
Usage Guidelines
Block IP packets when the source and destination are of interest.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect context 23 ip host 2002::c6a2:6419 any fragment
before redirect context 23 ip host 198.162.100.25 any fragment
after redirect context 23 ip host 2002::c6a2:6419 any fragment
no redirect context 23 ip host 2002::c6a2:6419 any fragment
redirect context (by TCP/UDP packets)
Used to redirect subscriber sessions based on the transmission control protocol/user datagram protocol packets sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect context context_id [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dst_port ] } after redirect context context_id [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dst_port ] } before redirect context context_id [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dst_port ] } no redirect context context_id [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dst_port ] }
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
context context_id
The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
tcp | udp
Specifies the redirect is to be applied to IP-based transmission control protocol or the user datagram protocol.
-
tcp: Redirect applies to TPC packets.
-
udp: Redirect applies to UDP packets.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
any
Specifies that the rule applies to all packets.
host
Specifies that the rule applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
eq source_port
Specifies a single, specific source TCP port number to be filtered.
source_port must be configured to an integer from 0 through 65535.
gt source_port
Specifies that all source TCP port numbers greater than the one specified are to be filtered.
source_port must be configured to an integer from 0 through 65535.
lt source_port
Specifies that all source TCP port numbers less than the one specified are to be filtered.
source_port must be configured to an integer from 0 through 65535.
neq source_port
Specifies that all source TCP port numbers not equal to the one specified are to be filtered.
source_port must be configured to an integer from 0 through 65535.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
eq dest_port
Specifies a single, specific destination TCP port number to be filtered.
dest_port must be configured to an integer from 0 through 65535.
gt dest_port
Specifies that all destination TCP port numbers greater than the one specified are to be filtered.
dest_port must be configured to an integer from 0 through 65535.
lt dest_port
Specifies that all destination TCP port numbers less than the one specified are to be filtered.
dest_port must be configured to an integer from 0 through 65535.
neq dest_port
Specifies that all destination TCP port numbers not equal to the one specified are to be filtered.
dest_port must be configured to an integer from 0 through 65535.
Usage Guidelines
Block IP packets when the source and destination are of interest but for only a limited set of ports.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect context 23 udp any
before redirect context 23 udp any
after redirect context 23 udp any
no redirect context 23 udp any
redirect css delivery-sequence
This is a restricted command. In StarOS 9.0 and later, this command is obsoleted.
redirect css service (any)
Used to redirect subscriber sessions based on any packet received with Content Service Steering (CSS) enabled. This command is also used to set the access control list insertion point.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] any after redirect css service svc_name [ log ] any before redirect css service svc_name [ log ] any no redirect css service svc_name [ log ] any
after
Indicates all rule definitions defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definitions which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the CSS service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.
svc_name must be a string of 1 through 15 characters.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
any
Indicates all packets will match the redirect regardless of source and/or destination.
Usage Guidelines
Define a catch all rule definitions to place at the end of the list of rule definitions to provide explicit handling of rule definitions which do not fit any other criteria.
It is suggested that any rule definition which is added to be a catch all should also have the log option specified. The logged packets may be used to determine if the current list of rule definitions is adequate or needs modification to ensure proper security.
A maximum of 16 rule definitions can be configured per ACL.
Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect css service css-svc1 any
before redirect css service css-svc1 any
after redirect css service css-svc1 any
no redirect css service css-svc1 any
redirect css service (by host IP address)
Used to redirect subscriber sessions based on the targeted host IP address sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] host source_host_address after redirect css service svc_name [ log ] host source_host_address before redirect css service svc_name [ log ] host source_host_address no redirect css service svc_name [ log ] host source_host_address
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.
svc_name must be an alphanumeric string of 1 through 15 characters.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
host
Specifies that the rule definition applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
Usage Guidelines
Define a rule definition when a very specific remote host is to be blocked. In simplified networks where the access controls need only block a few hosts, this command allows the rule definitions to be very clear and concise.
A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect css service css-svc1 host fe80::c0a8:c80b
before redirect css service css-svc1 host fe80::c0a8:c80b
after redirect css service css-svc1 host fe80::c0a8:c80b
no redirect css service css-svc1 host fe80::c0a8:c80b
redirect css service (by ICMP packets)
Used to redirect subscriber sessions based on the internet control message protocol packets sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] icmp { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [icmp_type [ icmp_code ] ] after redirect css service svc_name [ log ] icmp { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [icmp_type [ icmp_code ] ] before redirect css service svc_name [ log ] icmp { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [icmp_type [ icmp_code ] ] no redirect css service svc_name [ log ] icmp { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [icmp_type [ icmp_code ] ]
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured charging services.
svc_name must be an alphanumeric string of 1 through 15 characters.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
any
Specifies that the rule definition applies to all packets.
host
Specifies that the rule definition applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
icmp_type
Specifies that all ICMP packets of a particular type are to be filtered. The type can be an integer value from 0 through 255.
icmp_code
Specifies that all ICMP packets of a particular code are to be filtered. The type is an integer from 0 through 255.
Usage Guidelines
Define a rule definition to block ICMP packets which can be used for address resolution and possibly be a security risk.
The IP redirecting allows flexible controls for pairs of individual hosts or groups by IP masking which allows the redirecting of entire subnets if necessary.
A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect css service css-svc1 icmp host 2002::c6a2:6419
before redirect css service css-svc1 icmp host 2002::c6a2:6419
after redirect css service css-svc1 icmp host 2002::c6a2:64195
no redirect css service css-svc1 icmp host 2002::c6a2:6419
redirect css service (by IP packets)
Used to redirect subscriber sessions based on the internet protocol packets sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] ip { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ fragment ] after redirect css service svc_name [ log ] ip { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ fragment ] before redirect css service svc_name [ log ] ip { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ fragment ] no redirect css service svc_name [ log ] ip { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ fragment ]
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.
svc_name must be an alphanumeric string of 1 through 15 characters.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
any
Specifies that the rule definition applies to all packets.
host
Specifies that the rule definition applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore, allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.
fragment
Indicates packet redirection is to be applied to IP packet fragments only.
Usage Guidelines
Block IP packets when the source and destination are of interest.
A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect css service css-svc1 ip host 2002::c6a2:6419 any fragment
before redirect css service css-svc1 ip host 2002::c6a2:6419 any fragment
after redirect css service css-svc1 ip host 2002::c6a2:6419 any fragment
no redirect css service css-svc1 ip host 2002::c6a2:6419 any fragment
redirect css service (by source IP address masking)
Used to redirect subscriber sessions based on the IP address mask sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] source_address source_wildcard after redirect css service svc_name [ log ] source_address source_wildcard before redirect css service svc_name [ log ] source_address source_wildcard no redirect css service svc_name [ log ] source_address source_wildcard
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.
svc_name must be an alphanumeric string of 1 through 15 characters.
log
Default: packets are not logged.
Indicates all packets which match the filter are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
Usage Guidelines
Define a rule definition when any packet from the IP addresses which fall into the group of addresses matching the IP address masking. This allows the reduction of filtering rule definitions as it does not require a rule definition for each source and destination pair.
A maximum of 16 rule definitions can be configured per ACL.
Examples
redirect css service css=svc1 2002::c6a2:6419
redirect css service (by TCP/UDP packets)
Used to redirect subscriber sessions based on the transmission control protocol/user datagram protocol packets sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] } after redirect css service svc_name [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] } after redirect css service svc_name [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] } no redirect css service svc_name [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] }
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured charging services.
svc_name must be an alphanumeric string of 1 through 15 characters.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
tcp | udp
Specifies the redirect is to be applied to IP-based transmission control protocol or the user datagram protocol.
-
tcp: Redirect applies to TPC packets.
-
udp: Redirect applies to UDP packets.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
any
Specifies that the rule definition applies to all packets.
host
Specifies that the rule definition applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon notation.
eq source_port
Specifies a single, specific source TCP port number to be filtered.
source_port must be configured to an integer from 0 to 65535.
gt source_port
Specifies that all source TCP port numbers greater than the one specified are to be filtered.
source_port must be configured to an integer from 0 to 65535.
lt source_port
Specifies that all source TCP port numbers less than the one specified are to be filtered.
source_port must be configured to an integer from 0 to 65535.
neq source_port
Specifies that all source TCP port numbers not equal to the one specified are to be filtered.
source_port must be configured to an integer from 0 to 65535.
range start_source_port end_source_port
Specifies that all source TCP ports within a specific range are to be filtered.
start_source_port is the initial port in the range and end_source_port is the final port in the range.
Both start_source_port and end_source_port can be configured to an integer from 0 to 65535.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
eq dest_port
Specifies a single, specific destination TCP port number to be filtered.
dest_port must be configured to an integer from 0 to 65535.
gt dest_port
Specifies that all destination TCP port numbers greater than the one specified are to be filtered.
dest_port must be configured to an integer from 0 to 65535.
lt dest_port
Specifies that all destination TCP port numbers less than the one specified are to be filtered.
dest_port must be configured to an integer from 0 to 65535.
neq dest_port
Specifies that all destination TCP port numbers not equal to the one specified are to be filtered.
dest_port must be configured to an integer from 0 to 65535.
range start_dest_port end_dest_port
Specifies that all destination TCP ports within a specific range are to be filtered.
start_dest_port is the initial port in the range and end_dest_port is the final port in the range.
Both start_dest_port and end_dest_port can be configured to an integer from 0 to 65535
Usage Guidelines
Block IP packets when the source and destination are of interest but for only a limited set of ports.
A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect css service css-svc1 udp any
before redirect css service css-svc1 udp any
after redirect css service css-svc1 udp any
no redirect css service css-svc1 udp any
redirect css service (for downlink, any)
Used to redirect subscriber sessions based on any packet received in the downlink (from the Mobile Node) direction. This command is also used to set the access control list insertion point.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] downlink any after redirect css service svc_name [ log ] downlink any before redirect css service svc_name [ log ] downlink any no redirect css service svc_name [ log ] downlink any
after
Indicates all rule definitions defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.
svc_name must be an alphanumeric string of 1 through 15 characters.
downlink
Apply this rule definition only to packets in the downlink (from the Mobile Node) direction.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
any
Indicates all packets will match the redirect regardless of source and/or destination.
Usage Guidelines
Define a catch all rule definition to place at the end of the list of rule definitions to provide explicit handling of rule definitions which do not fit any other criteria.
It is suggested that any rule definition which is added to be a catch all should also have the log option specified. The logged packets may be used to determine if the current list of rule definitions is adequate or needs modification to ensure proper security.
A maximum of 16 rule definitions can be configured per ACL.
Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect css service css-svc1 downlink any
before redirect service css-svc1 downlink any
after redirect service css-svc1 downlink any chgsvc1 downlink any
no redirect service css-svc1 downlink any
redirect css service (for downlink, by host IP address)
Used to redirect subscriber sessions based on the targeted host IP address in the downlink (from the Mobile Node) direction.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] downlink host source_host_address after redirect css service svc_name [ log ] downlink host source_host_address before redirect css service svc_name [ log ] downlink host source_host_address no redirect css service svc_name [ log ] downlink host source_host_address
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.
svc_name must be an alphanumeric string of 1 through 15 characters.
downlink
Apply this rule definition only to packets in the downlink (from the Mobile Node) direction.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
host
Specifies that the rule definition applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
Usage Guidelines
Define a rule definition when a very specific remote host is to be blocked. In simplified networks where the access controls need only block a few hosts, this command allows the rule definitions to be very clear and concise.
A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect service css-svc1 downlink host fe80::c0a8:c80b
before redirect service css-svc1 downlink host fe80::c0a8:c80b
after redirect service css-svc1 downlink host fe80::c0a8:c80b
no redirect service css-svc1 downlink host fe80::c0a8:c80b
redirect css service (for downlink, by ICMP packets)
Used to redirect subscriber sessions based on the internet control message protocol packets in the downlink (from the Mobile Node) direction.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] downlink icmp { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ icmp_type [ icmp_code ] ] after redirect css service svc_name [ log ] downlink icmp { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ icmp_type [ icmp_code ] ] before redirect css service svc_name [ log ] downlink icmp { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ icmp_type [ icmp_code ] ] no redirect css service svc_name [ log ] downlink icmp { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ icmp_type [ icmp_code ] ]
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.
svc_name must be an alphanumeric string of 1 through 15 characters.
downlink
Apply this rule definition only to packets in the downlink (from the Mobile Node) direction.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
any
Specifies that the rule definition applies to all packets.
host
Specifies that the rule definition applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
icmp_type
Specifies that all ICMP packets of a particular type are to be filtered. The type can be an integer value from 0 through 255.
icmp_code
Specifies that all ICMP packets of a particular code are to be filtered. The type can be an integer value from 0 through 255.
Usage Guidelines
Define a rule definition to block ICMP packets which can be used for address resolution and possibly be a security risk.
The IP redirecting allows flexible controls for pairs of individual hosts or groups by IP masking which allows the redirecting of entire subnets if necessary.
A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect css service css-svc1 downlink icmp host 2002::c6a2:6419
before redirect css service css-svc1 downlink icmp host 2002::c6a2:6419
after redirect css service css-svc1 downlink icmp host 2002::c6a2:6419
no redirect css service css-svc1 downlink icmp host 2002::c6a2:6419
redirect css service (for downlink, by IP packets)
Used to redirect subscriber sessions based on the internet protocol packets in the downlink (from the Mobile Node) direction.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] downlink ip { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ fragment ] after redirect css service svc_name [ log ] downlink ip { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ fragment ] before redirect css service svc_name [ log ] downlink ip { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ fragment ] no redirect css service svc_name [ log ] downlink ip { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ fragment ]
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.
svc_name must be a string of 1 through 15 characters.
downlink
Apply this rule definition only to packets in the downlink (from the Mobile Node) direction.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore, allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.
any
Specifies that the rule definition applies to all packets.
host
Specifies that the rule definition applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon notation.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
fragment
Indicates packet redirection is to be applied to IP packet fragments only.
Usage Guidelines
Block IP packets when the source and destination are of interest.
A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect css service css-svc1 downlink ip host 2002::c6a2:6419 any fragment
before redirect css service css-svc1 downlink ip host 2002::c6a2:6419 any fragment
after redirect css service css-svc1 downlink ip host 2002::c6a2:6419 any fragment
no redirect css service css-svc1 downlink ip host 2002::c6a2:6419 any fragment
redirect css service (for downlink, by source IP address masking)
Used to redirect subscriber sessions based on the IP address mask sent by the source in the downlink (from the Mobile Node) direction.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] downlink source_address source_wildcard after redirect css service svc_name [ log ] downlink source_address source_wildcard before redirect css service svc_name [ log ] downlink source_address source_wildcard no redirect css service svc_name [ log ] downlink source_address source_wildcard
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.
svc_name must be an alphanumeric string of 1 through 15 characters.
downlink
Apply this rule definition only to packets in the downlink (from the Mobile Node) direction.
log
Default: packets are not logged.
Indicates all packets which match the filter are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
Usage Guidelines
Define a rule definition when any packet from the IP addresses which fall into the group of addresses matching the IP address masking. This allows the reduction of filtering rule definitions as it does not require a rule definition for each source and destination pair.
A maximum of 16 rule definitions can be configured per ACL.
Examples
redirect css service css-svc1 donwlink fe80::c0a8:a04
redirect css service (for downlink, by TCP/UDP packets)
Used to redirect subscriber sessions to a charging service based on the transmission control protocol/user datagram protocol packets in the downlink (from the Mobile Node) direction.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] downlink { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] } after redirect css service svc_name [ log ] downlink { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] } after redirect css service svc_name [ log ] downlink { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] } no redirect css service svc_name [ log ] downlink { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] }
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.
svc_name must be an alphanumeric string of 1 through 15 characters.
downlink
Apply this rule definition only to packets in the downlink (from the Mobile Node) direction.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
tcp | udp
Specifies the redirect is to be applied to IP-based transmission control protocol or the user datagram protocol.
-
tcp: Redirect applies to TPC packets.
-
udp: Redirect applies to UDP packets.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
any
Specifies that the rule definition applies to all packets.
host
Specifies that the rule definition applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
eq source_port
Specifies a single, specific source TCP port number to be filtered.
source_port must be configured to an integer value from 0 to 65535.
gt source_port
Specifies that all source TCP port numbers greater than the one specified are to be filtered.
source_port must be configured to an integer value from 0 to 65535.
lt source_port
Specifies that all source TCP port numbers less than the one specified are to be filtered.
source_port must be configured to an integer value from 0 to 65535.
neq source_port
Specifies that all source TCP port numbers not equal to the one specified are to be filtered.
source_port must be configured to an integer value from 0 to 65535.
range start_source_port end_source_port
Specifies that all source TCP ports within a specific range are to be filtered.
start_source_port is the initial port in the range and end_source_port is the final port in the range.
Both start_source_port and end_source_port can be configured to an integer value from 0 to 65535.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
eq dest_port
Specifies a single, specific destination TCP port number to be filtered.
dest_port must be configured to an integer value from 0 to 65535.
gt dest_port
Specifies that all destination TCP port numbers greater than the one specified are to be filtered.
dest_port must be configured to an integer value from 0 to 65535.
lt dest_port
Specifies that all destination TCP port numbers less than the one specified are to be filtered.
dest_port must be configured to an integer value from 0 to 65535.
neq dest_port
Specifies that all destination TCP port numbers not equal to the one specified are to be filtered.
dest_port must be configured to an integer value from 0 to 65535.
range start_dest_port end_dest_port
Specifies that all destination TCP ports within a specific range are to be filtered.
start_dest_port is the initial port in the range and end_dest_port is the final port in the range.
Both start_dest_port and end_dest_port can be configured to an integer value from 0 to 65535.
Usage Guidelines
Block IP packets when the source and destination are of interest but for only a limited set of ports.
A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect css service css-svc1 downlink udp any
before redirect css service css-svc1 downlink udp any
after redirect css service css-svc1 downlink udp any
no redirect css service css-svc1 downlink udp any
redirect css service (for uplink, any)
Used to redirect subscriber sessions based on any packet received in the uplink (to the Mobile Node) direction. This command is also used to set the access control list insertion point.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] uplink any after redirect css service svc_name [ log ] uplink any before redirect css service svc_name [ log ] uplink any no redirect css service svc_name [ log ] uplink any
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the Content Service steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.
svc_name must be an alphanumeric string of 1 through 15 characters.
uplink
Apply this rule definition only to packets in the uplink (to the Mobile Node) direction.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
any
Indicates all packets will match the redirect regardless of source and/or destination.
Usage Guidelines
Define a catch all rule definition to place at the end of the list of rule definitions to provide explicit handling of rule definitions which do not fit any other criteria.
It is suggested that any rule definition which is added to be a catch all should also have the log option specified. The logged packets may be used to determine if the current list of rule definitions is adequate or needs modification to ensure proper security.
A maximum of 16 rule definitions can be configured per ACL.
Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect css service css-svc1 uplink any
before redirect css service css-svc1 uplink any
after redirect css service css-svc1 uplink any
no redirect css service css-svc1 uplink any
redirect css service (for uplink, by host IP address)
Used to redirect subscriber sessions based on the targeted host IP address in the uplink (to the Mobile Node) direction.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] uplink host source_host_address after redirect css service svc_name [ log ] uplink host source_host_address before redirect css service svc_name [ log ] uplink host source_host_address no redirect css service svc_name [ log ] uplink host source_host_address
uplink
Apply this rule definition only to packets in the uplink (to the Mobile Node) direction.
after
Indicates all rule definitions defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the Content service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.
svc_name must ben alphanumeric string of 1 through 15 characters.
uplink
Apply this rule definition only to packets in the uplink (to the Mobile Node) direction.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
host
Specifies that the rule definition applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon notation.
Usage Guidelines
Define a rule definition when a very specific remote host is to be blocked. In simplified networks where the access controls need only block a few hosts, this command allows the rule definitions to be very clear and concise.
A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect service css-svc1 uplink host fe80::c0a8:c80b
before redirect service css-svc1 uplink host fe80::c0a8:c80b
after redirect service css-svc1 uplink host fe80::c0a8:c80b
no redirect service css-svc1 uplink host fe80::c0a8:c80b
redirect css service (for uplink, by ICMP packets)
Used to redirect subscriber sessions based on the internet control message protocol packets in the uplink (to the Mobile Node) direction.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] uplink icmp { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ icmp_type [ icmp_code ] ]
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.
svc_name must be an alphanumeric string of 1 through 15 characters.
uplink
Apply this rule definition only to packets in the uplink (to the Mobile Node) direction.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
any
Specifies that the rule definition applies to all packets.
host
Specifies that the rule definition applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
icmp_type
Specifies that all ICMP packets of a particular type are to be filtered. The type can be an integer value from 0 through 255.
icmp_code
Specifies that all ICMP packets of a particular code are to be filtered. The type can be an integer value from 0 through 255.
Usage Guidelines
Define a rule definition to block ICMP packets which can be used for address resolution and possibly be a security risk.
The IP redirecting allows flexible controls for pairs of individual hosts or groups by IP masking which allows the redirecting of entire subnets if necessary.
A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect css service chgsvc1 uplink icmp host 198.162.100.25
before redirect css service chgsvc1 uplink icmp host 198.162.100.25
after redirect css service chgsvc1 uplink icmp host 198.162.100.25
no redirect css service chgsvc1 uplink icmp host 198.162.100.25
redirect css service (for uplink, by IP packets)
Used to redirect subscriber sessions based on the internet protocol packets in the uplink (to the Mobile Node) direction.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] uplink ip { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ fragment ] after redirect css service svc_name [ log ] uplink ip { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ fragment ] before redirect css service svc_name [ log ] uplink ip { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ fragment ] no redirect css service svc_name [ log ] uplink ip { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ fragment ]
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
before
Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
If the options specified do not exactly match an existing rule definition, the insertion point does not change.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the active charging service to which packets are to be redirected. At the executive mode prompt, use the show active-charging service all command to display the names of all configured charging services.
svc_name must be a string of 1 through 15 characters.
uplink
Apply this rule definition only to packets in the uplink (to the Mobile Node) direction.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore, allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.
any
Specifies that the rule definition applies to all packets.
host
Specifies that the rule definition applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon notation.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
fragment
Indicates packet redirection is to be applied to IP packet fragments only.
Usage Guidelines
Block IP packets when the source and destination are of interest.
Examples
redirect css service chgsvc1 uplink ip host 198.162.100.25 any fragment
redirect css service chgsvc1 uplink ip host 198.162.100.25 any fragment
after redirect css service chgsvc1 uplink ip host 198.162.100.25 any fragment
no redirect css service chgsvc1 uplink ip host 198.162.100.25 any fragment
redirect css service (for uplink, by source IP address masking)
Used to redirect subscriber sessions based on the IP address mask sent by the source in the uplink (to the Mobile Node) direction.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] uplink source_address source_wildcard
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
before
Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the active charging service to which packets are to be redirected. At the executive mode prompt, use the show active-charging service all command to display the names of all configured charging services.
svc_name must be a string of 1 through 15 characters.
uplink
Apply this rule definition only to packets in the uplink (to the Mobile Node) direction.
log
Default: packets are not logged.
Indicates all packets which match the filter are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
Usage Guidelines
Define a rule definition when any packet from the IP addresses which fall into the group of addresses matching the IP address masking. This allows the reduction of filtering rule definitions as it does not require a rule definition for each source and destination pair.
Examples
redirect css service chgsvc1 uplink 1:1:1:1:1:1:1:1
redirect css service (for uplink, by TCP/UDP packets)
Used to redirect subscriber sessions to a charging service based on the transmission control protocol/user datagram protocol packets in the uplink (to the Mobile Node) direction.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect css service svc_name [ log ] uplink { tcp | udp } { { source_address source_wildcard | any | source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] } after redirect css service svc_name [ log ] uplink { tcp | udp } { { source_address source_wildcard | any | source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] } before redirect css service svc_name [ log ] uplink { tcp | udp } { { source_address source_wildcard | any | source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] } no redirect css service svc_name [ log ] uplink { tcp | udp } { { source_address source_wildcard | any | source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] }
after
Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.
before
Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.
no
Removes the rule definition which exactly matches the options specified.
css service svc_name
The name of the active charging service to which packets are to be redirected. At the executive mode prompt, use the show active-charging service all command to display the names of all configured charging services.
svc_name must be a string of 1 through 15 characters.
uplink
Apply this rule definition only to packets in the uplink (to the Mobile Node) direction.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
tcp | udp
Specifies the redirect is to be applied to IP-based transmission control protocol or the user datagram protocol.
-
tcp: Redirect applies to TPC packets.
-
udp: Redirect applies to UDP packets.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
any
Specifies that the rule definition applies to all packets.
host
Specifies that the rule definition applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon notation.
eq source_port
Specifies a single, specific source TCP port number to be filtered.
source_port must be configured to an integer value from 0 to 65535.
gt source_port
Specifies that all source TCP port numbers greater than the one specified are to be filtered.
source_port must be configured to an integer value from 0 to 65535.
lt source_port
Specifies that all source TCP port numbers less than the one specified are to be filtered.
source_port must be configured to an integer value from 0 to 65535.
neq source_port
Specifies that all source TCP port numbers not equal to the one specified are to be filtered.
source_port must be configured to an integer value from 0 to 65535.
range start_source_port end_source_port
Specifies that all source TCP ports within a specific range are to be filtered.
start_source_port is the initial port in the range and end_source_port is the final port in the range.
Both start_source_port and end_source_port can be configured to an integer value from 0 to 65535.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
eq dest_port
Specifies a single, specific destination TCP port number to be filtered.
dest_port must be configured to an integer value from 0 to 65535.
gt dest_port
Specifies that all destination TCP port numbers greater than the one specified are to be filtered.
dest_port must be configured to an integer value from 0 to 65535.
lt dest_port
Specifies that all destination TCP port numbers less than the one specified are to be filtered.
dest_port must be configured to an integer value from 0 to 65535.
neq dest_port
Specifies that all destination TCP port numbers not equal to the one specified are to be filtered.
dest_port must be configured to an integer value from 0 to 65535.
range start_dest_port end_dest_port
Specifies that all destination TCP ports within a specific range are to be filtered.
start_dest_port is the initial port in the range and end_dest_port is the final port in the range.
Both start_dest_port and end_dest_port can be configured to an integer value from 0 to 65535.
Usage Guidelines
Block IP packets when the source and destination are of interest but for only a limited set of ports.
Examples
redirect css service chgsvc1 uplink udp any
before redirect css service chgsvc1 uplink udp any
after redirect css service chgsvc1 uplink udp any
no redirect css service chgsvc1 uplink udp any
redirect nexthop (by IP address masking)
Used to redirect subscriber sessions based on the IP address mask sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] source_address source_wildcard after redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] source_address source_wildcard before redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] source_address source_wildcard no redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] source_address source_wildcard
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
nexthop nexthop_addr
The IP address to which the IP packets are redirected.
context context_id
The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.
interface interface_name
The name of the logical interface to which the packets should be redirected. interface_name must be an alpha and/or numeric string from 1 to 79 characters.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore, allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.
Usage Guidelines
Define a rule when any packet from the IP addresses which fall into the group of addresses matching the IP address masking. This allows the reduction of redirect rules as it does not require a rule for each source and destination pair.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect nexthop 192.168.10.4 context 23 198.162.22.0 0.0.0.31
before redirect nexthop 192.168.10.4 context 23 198.162.22.0 0.0.0.31
after redirect nexthop 192.168.10.4 context 23 198.162.22.0 0.0.0.31
no redirect nexthop 192.168.10.4 context 23 198.162.22.0 0.0.0.31
redirect nexthop (any)
Used to redirect subscriber sessions based on any packet received. This command is also used to set the access control list insertion point.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] any after redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] any before redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] any no redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] any
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
nexthop nexthop_addr
The IP address to which the IP packets are redirected.
context context_id
The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.
interface interface_name
The name of the logical interface to which the packets should be redirected. interface_name must be an alpha and/or numeric string from 1 to 79 characters.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
any
Indicates all packets will match the redirect regardless of source and/or destination.
Usage Guidelines
Define a catch all rule to place at the end of the list of rules to provide explicit handling of rules which do not fit any other criteria.
It is suggested that any rule which is added to be a catch all should also have the log option specified. The logged packets may be used to determine if the current list of rules is adequate or needs modification to ensure proper security. The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect nexthop 192.168.10.4 context 23 any
before redirect nexthop 192.168.10.4 context 23 any
after redirect nexthop 192.168.10.4 context 23 any
no redirect nexthop 192.168.10.4 context 23 any
redirect nexthop (by host IP address)
Used to redirect subscriber sessions based on the targeted host IP address sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] host source_ip_address after redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] host source_ip_address before redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] host source_ip_address no redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] host source_ip_address
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
nexthop nexthop_addr
The IP address to which the IP packets are redirected.
context context_id
The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.
interface interface_name
The name of the logical interface to which the packets should be redirected. interface_name must be an alpha and/or numeric string from 1 to 79 characters.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
host
Specifies that the rule applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon notation.
Usage Guidelines
Define a rule when a very specific remote host is to be blocked. In simplified networks where the access controls need only block a few hosts, this command allows the rules to be very clear and concise.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect nexthop 192.168.10.4 context 23 host 192.168.200.11
before redirect nexthop 192.168.10.4 context 23 host 192.168.200.11
after redirect nexthop 192.168.10.4 context 23 host 192.168.200.11
no redirect nexthop 192.168.10.4 context 23 host 192.168.200.11
redirect nexthop (by source ICMP packets)
Used to redirect subscriber sessions based on the internet control message protocol packets sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] icmp { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ icmp_type [ icmp_code ] ] after redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] icmp { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ icmp_type [ icmp_code ] ] before redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] icmp { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ icmp_type [ icmp_code ] ] no redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] icmp { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ icmp_type [ icmp_code ] ]
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
nexthop nexthop_addr
The IP address to which the IP packets are redirected.
context context_id
The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.
interface interface_name
The name of the logical interface to which the packets should be redirected. interface_name must be an alpha and/or numeric string from 1 to 79 characters.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore, allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.
any
Specifies that the rule applies to all packets.
host
Specifies that the rule applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon notation.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
icmp_type
Specifies that all ICMP packets of a particular type are to be filtered. The type can be an integer value from 0 through 255.
icmp_code
Specifies that all ICMP packets of a particular code are to be filtered. The type can be an integer value from 0 through 255.
Usage Guidelines
Define a rule to block ICMP packets which can be used for address resolution and possible be a security risk.
The IP redirecting allows flexible controls for pairs of individual hosts or groups by IP masking which allows the redirecting of entire subnets if necessary.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect nexthop fe80::c0a8:a04 context 23 icmp host 2002::c6a2:6419
before redirect nexthop fe80::c0a8:a04 context 23 icmp host 2002::c6a2:6419
after redirect nexthop fe80::c0a8:a04 context 23 icmp host 2002::c6a2:6419
no redirect nexthop fe80::c0a8:a04 context 23 icmp host 2002::c6a2:6419
redirect nexthop (by IP packets)
Used to redirect subscriber sessions based on the internet protocol packets sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] ip { source_address source_wildcard | any | host source_host_address } { dest_address dest_wildcard | any | host dest_host_address } [ fragment ] [ protocol num ]
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
nexthop nexthop_addr
The IP address to which the IP packets are redirected.
context context_id
The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.
interface interface_name
The name of the logical interface to which the packets should be redirected. interface_name must be an alphanumeric string from 1 through 79 characters.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
any
Specifies that the rule applies to all packets.
host
Specifies that the rule applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
fragment
Indicates packet redirection is to be applied to IP packet fragments only.
protocol num
Indicates that the packet filtering is to be applied to a specific protocol number.
num can be an integer from 0 through 255.
Usage Guidelines
Block IP packets when the source and destination are of interest.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
redirect nexthop (by TCP/UDP packets)
Used to redirect subscriber sessions based on the transmission control protocol/user datagram protocol packets sent by the source to the mobile node or the network.
Product
All
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration
configure > context context_name > ipv6 access-list ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
Syntax Description
redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port ] } after redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port ] } before redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port ] } no redirect nexthop nexthop_addr { context context_id | interface interface_name } [ log ] { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port ] }
after
Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.
This moves the insertion point to immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
before
Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.
If the options specified do not exactly match an existing rule, the insertion point does not change.
no
Removes the rule which exactly matches the options specified.
nexthop nexthop_addr
The IP address to which the IP packets are redirected.
context context_id
The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.
interface interface_name
The name of the logical interface to which the packets should be redirected. interface_name must be an alphanumeric string from 1 through 79 characters.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
tcp | udp
Specifies the redirect is to be applied to IP-based transmission control protocol or the user datagram protocol.
-
tcp: Redirect applies to TCP packets.
-
udp: Redirect applies to UDP packets.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.
source_wildcard
This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB).
any
Specifies that the rule applies to all packets.
host
Specifies that the rule applies to a specific host as determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
dest_host_address
The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.
eq source_port
Specifies a single, specific source TCP port number to be filtered.
source_port must be configured to an integer value from 0 to 65535.
gt source_port
Specifies that all source TCP port numbers greater than the one specified are to be filtered.
source_port must be configured to an integer value from 0 to 65535.
lt source_port
Specifies that all source TCP port numbers less than the one specified are to be filtered.
source_port must be configured to an integer value from 0 to 65535.
neq source_port
Specifies that all source TCP port numbers not equal to the one specified are to be filtered.
source_port must be configured to an integer value from 0 to 65535.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or a group of IP addresses.
When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.
The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore, allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.
eq dest_port
Specifies a single, specific destination TCP port number to be filtered.
dest_port must be configured to an integer value from 0 to 65535.
gt dest_port
Specifies that all destination TCP port numbers greater than the one specified are to be filtered.
dest_port must be configured to an integer value from 0 to 65535.
lt dest_port
Specifies that all destination TCP port numbers less than the one specified are to be filtered.
dest_port must be configured to an integer value from 0 to 65535.
neq dest_port
Specifies that all destination TCP port numbers not equal to the one specified are to be filtered.
dest_port must be configured to an integer value from 0 to 65535.
Usage Guidelines
Block IP packets when the source and destination are of interest but for only a limited set of ports.
The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.
Examples
redirect nexthop fe80::c0a8:a04 context 23 udp any
before redirect nexthop fe80::c0a8:a04 context 23 udp any
after redirect nexthop fe80::c0a8:a04 context 23 udp any
no redirect nexthop fe80::c0a8:a04 context 23 udp any
Feedback