- Preface
- Cisco Embedded Wireless Controller on Catalyst Access Points
-
- Network Mobility Services Protocol
- Application Visibility and Control
- Flexible NetFlow Exporter on Embedded Wireless Controller
- Cisco Connected Mobile Experiences Cloud
- EDCA Parameters
- 802.11 parameters and Band Selection
- Image Download
- Conditional Debug and Radioactive Tracing
- Aggressive Client Load Balancing
- Accounting Identity List
- Volume Metering
- Enabling Syslog Messages in Access Points and Controller for Syslog Server
- Software maintenance upgrade
-
- IPv4 ACLs
- DNS-Based Access Control Lists
- Allowed List of Specific URLs
- Web-Based Authentication
- Central Web Authentication
- ISE Simplification and Enhancements
- Authentication and Authorization Between Multiple RADIUS Servers
- Secure LDAP
- RADIUS DTLS
- MAC Filtering
- Dynamic Frequency Selection
- Managing Rogue Devices
- Classifying Rogue Access Points
- Configuring Secure Shell
- Private Shared Key
- Multi-Preshared Key
- Multiple Authentications for a Client
- Information About Cisco Umbrella WLAN
- Locally Significant Certificates
- Certificate Management
Information About IPv6 ACL
An access control list (ACL) is a set of rules used to limit access to a particular interface (for example, if you want to restrict a wireless client from pinging the management interface of the embedded wireless controller). ACLs are configured on the devicend applied to the management interface, the AP-manager interface, any of the dynamic interfaces, or a WLAN to control data traffic to and from wireless clients or to the embedded wireless controller central processing unit (CPU) to control all traffic destined for the CPU.
You can also create a preauthentication ACL for web authentication. Such an ACL is used to allow certain types of traffic before authentication is complete.
IPv6 ACLs support the same options as IPv4 ACLs including source, destination, source and destination ports.
![]() Note |
You can enable only IPv4 traffic in your network by blocking IPv6 traffic. That is, you can configure an IPv6 ACL to deny all IPv6 traffic and apply it on specific or all WLANs. |
Types of ACL
Per User IPv6 ACL
For the per-user ACL, the full access control entries (ACE) as the text strings are configured on the Cisco Secure Access Control Server (Cisco Secure ACS).
The ACE is not configured on the Controller
Embedded Wireless Controller. The ACE is sent to the device in the ACCESS-Accept attribute and applies it directly for the client. When a wireless client roams into an foreign device, the ACEs are sent to the foreign device as an AAA attribute in the mobility Handoff message. Output direction, using per-user ACL is not supported.
Filter ID IPv6 ACL
For the filter-Id ACL, the full ACEs and the acl name(filter-id) is configured on the device and only the filter-id is configured on the Cisco Secure ACS.
The
filter-id
is sent to the
device
in the ACCESS-Accept attribute, and the
device
looks up the filter-id for the ACEs, and then applies the ACEs to the client.
When the client L2 roams to the foreign
device,
only the filter-id is sent to the foreign
device
in the mobility Handoff message. Output filtered ACL, using per-user ACL is not
supported. The foreign
device
has to configure the filter-id and ACEs beforehand.
Downloadable IPv6 ACL
For the downloadable ACL (dACL), all the full ACEs and the dacl name are configured only on the Cisco Secure ACS.
The Cisco Secure ACS sends the dacl name to the device in its ACCESS-Accept attribute, which takes the dacl name and sends the dACL name back to the Cisco Secure ACS for the ACEs, using the ACCESS-request attribute.
Prerequisites for Configuring IPv6 ACL
You can filter IP Version 6 (IPv6) traffic by creating IPv6 access control lists (ACLs) and applying them to interfaces similarly to the way that you create and apply IP Version 4 (IPv4) named ACLs. You can also create and apply input router ACLs to filter Layer 3 management traffic when the switch is running the Network Essentials license.
Restrictions for Configuring IPv6 ACL
With IPv4, you can configure standard and extended numbered IP ACLs, named IP ACLs, and MAC ACLs. IPv6 supports only named ACLs.
The device supports most of the Cisco IOS-supported IPv6 ACLs with some exceptions:
-
The device does not support matching on these keywords: flowlabel, routing header, and undetermined-transport.
-
The device does not support reflexive ACLs (the reflect keyword).
-
The device does not apply MAC-based ACLs on IPv6 frames.
-
When configuring an ACL, there is no restriction on keywords entered in the ACL, regardless of whether or not they are supported on the platform. When you apply the ACL to an interface that requires hardware forwarding (physical ports or SVIs), the device checks to determine whether or not the ACL can be supported on the interface. If not, attaching the ACL is rejected.
-
If an ACL is applied to an interface and you attempt to add an access control entry (ACE) with an unsupported keyword, the device does not allow the ACE to be added to the ACL that is currently attached to the interface
Configuring IPv6 ACLs
Follow the procedure given below to filter IPv6 traffic:
-
Create an IPv6 ACL, and enter IPv6 access list configuration mode.
-
Configure the IPv6 ACL to block (deny) or pass (permit) traffic.
-
Apply the IPv6 ACL to the interface where the traffic needs to be filtered.
-
Apply the IPv6 ACL to an interface. For router ACLs, you must also configure an IPv6 address on the Layer 3 interface to which the ACL is applied.
Default IPv6 ACL Configuration
There are no IPv6 ACLs configured or applied.
Interaction with Other Features and Switches
-
If an IPv6 router ACL is configured to deny a packet, the packet is not routed. A copy of the packet is sent to the Internet Control Message Protocol (ICMP) queue to generate an ICMP unreachable message for the frame.
-
If a bridged frame is to be dropped due to a port ACL, the frame is not bridged.
-
You can create both IPv4 and IPv6 ACLs on a switch or switch stack, and you can apply both IPv4 and IPv6 ACLs to the same interface. Each ACL must have a unique name; an error message appears if you try to use a name that is already configured.
You use different commands to create IPv4 and IPv6 ACLs and to attach IPv4 or IPv6 ACLs to the same Layer 2 or Layer 3 interface. If you use the wrong command to attach an ACL (for example, an IPv4 command to attach an IPv6 ACL), you receive an error message.
-
You cannot use MAC ACLs to filter IPv6 frames. MAC ACLs can only filter non-IP frames.
-
If the hardware memory is full, for any additional configured ACLs, packets are dropped to the CPU, and the ACLs are applied in software. When the hardware is full a message is printed to the console indicating the ACL has been unloaded and the packets will be dropped on the interface.
How To Configure an IPv6 ACL
Creating an IPv6 ACL
Procedure
| Command or Action | Purpose | |
|---|---|---|
|
Step 1 |
enable Example:
|
Enables privileged EXEC mode. Enter your password if prompted. |
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
|
Step 3 |
ipv6 access-list acl_name Example:
|
Use a name to define an IPv6 access list and enter IPv6 access-list configuration mode. |
|
Step 4 |
{deny|permit} protocol Example:
|
Enter deny or permit to specify whether to deny or permit the packet if conditions are matched. These are the conditions:
If the operator follows the source-ipv6-prefix/prefix-length argument, it must match the source port. If the operator follows the destination-ipv6- prefix/prefix-length argument, it must match the destination port.
|
|
Step 5 |
{deny|permit} tcp Example:
|
(Optional) Define a TCP access list and the access conditions. Enter tcp for Transmission Control Protocol. The parameters are the same as those described in Step 3, with these additional optional parameters:
|
|
Step 6 |
{deny|permit} udp Example:
|
(Optional) Define a UDP access list and the access conditions. Enter udp for the User Datagram Protocol. The UDP parameters are the same as those described for TCP, except that the operator [port]] port number or name must be a UDP port number or name, and the established parameter is not valid for UDP. |
|
Step 7 |
{deny|permit} icmp Example:
|
(Optional) Define an ICMP access list and the access conditions. Enter icmp for Internet Control Message Protocol. The ICMP parameters are the same as those described for most IP protocols in Step 3a, with the addition of the ICMP message type and code parameters. These optional keywords have these meanings:
|
|
Step 8 |
end Example: |
Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. |
|
Step 9 |
show ipv6 access-list Example:
|
Verify the access list configuration. |
|
Step 10 |
copy running-config startup-config Example:
|
(Optional) Save your entries in the configuration file. |
Creating WLAN IPv6 ACL
Procedure
| Command or Action | Purpose |
|---|
Verifying IPv6 ACL
Displaying IPv6 ACLs
To display IPv6 ACLs, perform this procedure:
Procedure
| Command or Action | Purpose | |
|---|---|---|
|
Step 1 |
enable Example:
|
Enables privileged EXEC mode. Enter your password if prompted. |
|
Step 2 |
configure terminal Example:
|
Enters global configuration mode. |
|
Step 3 |
show access-list Example:
|
Displays all access lists configured on the device |
|
Step 4 |
show ipv6 access-list acl_name Example:
|
Displays all configured IPv6 access list or the access list specified by name. |
Configuration Examples for IPv6 ACL
Example: Creating an IPv6 ACL
![]() Note |
Logging is supported only on Layer 3 interfaces. |
Device(config)# ipv6 access-list CISCO
Device(config-ipv6-acl)# deny tcp any any gt 5000
Device (config-ipv6-acl)# deny ::/0 lt 5000 ::/0 log
Device(config-ipv6-acl)# permit icmp any any
Device(config-ipv6-acl)# permit any any
Example: Displaying IPv6 ACLs
Device #show access-lists
Extended IP access list hello
10 permit ip any any
IPv6 access list ipv6
permit ipv6 any any sequence 10Device# show ipv6 access-list
IPv6 access list inbound
permit tcp any any eq bgp (8 matches) sequence 10
permit tcp any any eq telnet (15 matches) sequence 20
permit udp any any sequence 30
IPv6 access list outbound
deny udp any any sequence 10
deny tcp any any eq telnet sequence 20
Feedback