IPv6 ACL Configuration Mode Commands

The IPv6 Access Control List Configuration Mode is used to create and manage IPv6 access privileges.

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Important

The commands or keywords/variables that are available are dependent on platform type, product version, and installed license(s).


deny/permit (by source IP address masking)

Used to filter subscriber sessions based on the IPv6 address mask sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

{ deny | permit } [ log ]  source_address source_wildcard 
after { deny | permit } [ log ]  source_address source_wildcard 
before { deny | permit } [ log ]  source_address source_wildcard 
no { deny | permit } [ log ]  source_address source_wildcard 

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change


no

Removes the rule which exactly matches the options specified.

deny | permit

Specifies the rule is either block (deny) or an allow (permit) filter.

  • deny : Indicates the rule, when matched, drops the corresponding packets.

  • permit : Indicates the rule, when matched, allows the corresponding packets.

log

Default: packets are not logged.

Indicates all packets which match the filter are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


Usage Guidelines

Define a rule when any packet from the IP addresses which fall into the group of addresses matching the IP address masking. This allows the reduction of filtering rules as it does not require a rule for each source and destination pair.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide.


Examples

The following command defines two rules with the second logging filtered packets:
permit 2001:4A2B::1f3F   
deny log 2001:4A2B::1f3F  
The following sets the insertion point to before the first rule defined above:
before permit 2001:4A2B::1f3F  
The following command sets the insertion point after the second rule defined above:
after deny log 2001:4A2B::1f3F  
The following deletes the first rule defined above:
no permit 2001:4A2B::1f3F  

deny/permit (any)

Used to filter subscriber sessions based on any packet received. This command is also used to set the access control list insertion point.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

{ deny | permit } [ log ] any  
after { deny | permit } [ log ] any  
before { deny | permit } [ log ] any  
no { deny | permit } [ log ] any  

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

deny | permit

Specifies the rule is either block (deny) or an allow (permit) filter.

  • deny : Indicates the rule, when matched, drops the corresponding packets.

  • permit : Indicates the rule, when matched, allows the corresponding packets.

log

Default: packets are not logged.

Indicates all packets which match the filter are to be logged.

any

Indicates all packets will match the filter regardless of source and/or destination.

Usage Guidelines

Define a catch all rule to place at the end of the list of rules.


Important

It is suggested that any rule which is added to be a catch all should also have the log option specified. The logged packets may be used to determine if the current list of rules is adequate or needs modification to ensure proper security. The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide.


Examples

The following command defines two rules with the second logging filtered packets:
permit any  
deny log any  
The following sets the insertion point to before the first rule defined above:
before permit any  
The following command sets the insertion point after the second rule defined above:
after deny log any  
The following deletes the first rule defined above:
no permit any  

deny/permit (by host IP address)

Used to filter subscriber sessions based on the targeted host IP address sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

{ deny | permit } [ log ] host  source_host_address 
after { deny | permit } [ log ] host  source_host_address 
before { deny | permit } [ log ] host  source_host_address 
no { deny | permit } [ log ] host  source_host_address 

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

deny | permit

Specifies the rule is either block (deny) or an allow (permit) filter.

  • deny : Indicates the rule, when matched, drops the corresponding packets.

  • permit : Indicates the rule, when matched, allows the corresponding packets.

log

Default: packets are not logged.

Indicates all packets which match the filter are to be logged.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon notation.

Usage Guidelines

Define a rule when a very specific remote host is to be blocked. In simplified networks where the access controls need only block a few hosts, this command allows the rules to be very clear and concise.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide.


Examples

The following command defines two rules with the second logging filtered packets:
permit host 2001:4A2B::1f3F  
deny log host 2001:4A2B::1f3F  
The following sets the insertion point to before the first rule defined above:
before permit host 2001:4A2B::1f3F  
The following command sets the insertion point after the second rule defined above:
after deny log host 2001:4A2B::1f3F  
The following deletes the first rule defined above:
no permit host 2001:4A2B::1f3F  

deny/permit (by source ICMP packets)

Used to filter subscriber sessions based on the internet control message protocol packets sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

{ deny | permit } [ log ] icmp {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [  icmp_type [  icmp_code ] ]  
after { deny | permit } [ log ] icmp {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [  icmp_type [  icmp_code ] ]  
before { deny | permit } [ log ] icmp {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [  icmp_type [  icmp_code ] ]  
no { deny | permit } [ log ] icmp {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [  icmp_type [  icmp_code ] ]  

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

deny | permit

Specifies the rule is either block (deny) or an allow (permit) filter.

  • deny : Indicates the rule, when matched, drops the corresponding packets.

  • permit : Indicates the rule, when matched, allows the corresponding packets.

log

Default: packets are not logged.

Indicates all packets which match the filter are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


any

Specifies that the rule applies to all packets.

host

Specifies that the rule applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 hexadecimal-colon-separated notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 hexadecimal-colon-separated notation.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


icmp_type

Specifies that all ICMP packets of a particular type are to be filtered. The type is an integer from 0 through 255.

icmp_code

Specifies that all ICMP packets of a particular code are to be filtered. The type is an integer from 0 through 255.

Usage Guidelines

Define a rule to block ICMP packets which can be used for address resolution and possible be a security risk.

The IP filtering allows flexible controls for pairs of individual hosts or groups by IP masking which allows the filtering of entire subnets if necessary.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide.


Examples

The following command defines two rules with the second logging filtered packets:
permit icmp host 2001:4A2B::1f3F4 any 168  
deny log icmp 2001:4A2B::1f3F 2001:4a2b::1f00 host fe80::a02:410 168 11  
The following sets the insertion point to before the first rule defined above:
before permit icmp host 2001:4A2B::1f3F any 168  
The following command sets the insertion point after the second rule defined above:
after deny log icmp 2001:4A2B::1f3F 2001:4a2b::1f00 host fe80::a02:410 168 11  
The following deletes the first rule defined above:
no permit icmp host 2001:4A2B::1f3F any 168  

deny/permit (by IP packets)

Used to filter subscriber sessions based on the internet protocol packets sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

{ deny | permit } [ log ] ip {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [ fragment ] [ protocol num ]  
after { deny | permit } [ log ] ip {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [ fragment ] [ protocol num ]  
before { deny | permit } [ log ] ip {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [ fragment ] [ protocol num ]  
no { deny | permit } [ log ] ip {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [ fragment ] [ protocol num ]  

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

deny | permit

Specifies the rule is either block (deny) or an allow (permit) filter.

  • deny : indicates the rule, when matched, drops the corresponding packets.

  • permit : indicates the rule, when matched, allows the corresponding packets.

log

Default: packets are not logged.

Indicates all packets which match the filter are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore, allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.


any

Specifies that the rule applies to all packets.

host

Specifies that the rule applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon notation.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


fragment

Indicates packet filtering is to be applied to IP packet fragments only.

protocol num

Indicates that the packet filtering is to be applied to a specific protocol number.

num can be any integer ranging from 0 to 255.

Usage Guidelines

Block IP packets when the source and destination are of interest.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide.


Examples

The following command defines two rules with the second logging filtered packets:
permit ip host 2001:4A2B::1f3F any fragment  
deny log ip 2001:4A2B::1f3F 2001:4a2b::1f00 host fe80::a02:410  
The following sets the insertion point to before the first rule defined above:
before permit ip host 2001:4A2B::1f3F any fragment  
The following command sets the insertion point after the second rule defined above:
after deny log ip 2001:4A2B::1f3F 2001:4a2b::1f00 host fe80::a02:410  
The following deletes the first rule defined above:
no permit ip host  2001:4A2B::1f3F any fragment  

deny/permit (by TCP/UDP packets)

Used to filter subscriber sessions based on the transmission control protocol/user datagram protocol packets sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

{ deny | permit } [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dst_port ] }  
after { deny | permit } [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dst_port ] }  
before { deny | permit } [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dst_port ] }  
no { deny | permit } [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dst_port ] }  

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

deny | permit

Specifies the rule is either block (deny) or an allow (permit) filter.

  • deny : Indicates the rule, when matched, drops the corresponding packets.

  • permit : Indicates the rule, when matched, allows the corresponding packets.

log

Default: packets are not logged.

Indicates all packets which match the filter are to be logged.

tcp | udp

Specifies the filter is to be applied to IP-based transmission control protocol or the user datagram protocol.

  • tcp : Filter applies to TPC packets.

  • udp : Filter applies to UDP packets.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


any

Specifies that the rule applies to all packets.

host

Specifies that the rule applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

eq source_port

Specifies a single, specific source TCP port number to be filtered.

source_port must be configured to an integer from 0 through 65535.

gt source_port

Specifies that all source TCP port numbers greater than the one specified are to be filtered.

source_port must be configured to an integer from 0 through 65535.

lt source_port

Specifies that all source TCP port numbers less than the one specified are to be filtered.

source_port must be configured to an integer from 0 through 65535.

neq source_port

Specifies that all source TCP port numbers not equal to the one specified are to be filtered.

source_port must be configured to an integer from 0 through 65535.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


eq dest_port

Specifies a single, specific destination TCP port number to be filtered.

dest_port must be configured to an integer from 0 through 65535.

gt dest_port

Specifies that all destination TCP port numbers greater than the one specified are to be filtered.

dest_port must be configured to an integer from 0 through 65535.

lt dest_port

Specifies that all destination TCP port numbers less than the one specified are to be filtered.

dest_port must be configured to an integer from 0 through 65535.

neq dest_port

Specifies that all destination TCP port numbers not equal to the one specified are to be filtered.

dest_port must be configured to an integer from 0 through 65535.

Usage Guidelines

Block IP packets when the source and destination are of interest but for only a limited set of ports.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide.


Examples

The following command defines four rules with the second and fourth rules logging filtered packets:
permit tcp host 2001:4A2B::1f3F any  
deny log udp 2001:4A2B::1f3F 2001:4a2b::1f00 host fe80::a02:410  
permit tcp host 2001:4A2B::1f3F gt 1023 any  
The following sets the insertion point to before the first rule defined above:
before permit tcp host 2001:4A2B::1f3F any  
The following command sets the insertion point after the second rule defined above:
after deny log udp 2001:4A2B::1f3F 2001:4a2b::1f00 host fe80::a02:410  
The following deletes the third rule defined above:
no permit tcp host 2001:4A2B::1f3F gt 1023 any  

end

Exits the current configuration mode and returns to the Exec mode.

Product

All

Privilege

Security Administrator, Administrator

Syntax

end  

Usage Guidelines

Use this command to return to the Exec mode.

exit

Exits the current mode and returns to the parent configuration mode.

Product

All

Privilege

Security Administrator, Administrator

Syntax

exit  

Usage Guidelines

Use this command to return to the parent configuration mode.

readdress server

Alter the destination address and port number in TCP or UDP packet headers to redirect packets to a different server.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

readdress server  redirect_address [ port  port_number ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dst_port ] } 
 
after readdress server  redirect_address [ port  port_no ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dst_port ] }  
before readdress server  redirect_address [ port  port_no ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dst_port ] }  
no readdress server  redirect_address [ port  port_number ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dst_port ] }  

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

redirect_address

The IP address to which the IP packets are redirected. TCP or UDP packet headers are rewritten to contain the new destination address. This must expressed in IPv6 colon-separated-hexadecimal notation.

port port_number

The number of the port at the redirect address where the packets are sent. TCP or UDP packet headers are rewritten to contain the new destination port number.

tcp | udp

Specifies the redirect is to be applied to the IP-based transmission control protocol or the user datagram protocol.

  • tcp : Redirect applies to TCP packets.

  • udp : Redirect applies to UDP packets.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

any

Specifies that the rule applies to all packets.

host

Specifies that the rule applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

eq source_port

Specifies a single, specific source TCP port number to be filtered.

source_port must be configured to an integer from 0 through 65535.

gt source_port

Specifies that all source TCP port numbers greater than the one specified are to be filtered.

source_port must be configured to an integer from 0 through 65535.

lt source_port

Specifies that all source TCP port numbers less than the one specified are to be filtered.

source_port must be configured to an integer from 0 through 65535.

neq source_port

Specifies that all source TCP port numbers not equal to the one specified are to be filtered.

source_port must be configured to an integer from 0 through 65535.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

eq dest_port

Specifies a single, specific destination TCP port number to be filtered.

dest_port must be configured to an integer from 0 through 65535.

gt dest_port

Specifies that all destination TCP port numbers greater than the one specified are to be filtered.

dest_port must be configured to an integer from 0 through 65535.

lt dest_port

Specifies that all destination TCP port numbers less than the one specified are to be filtered.

dest_port must be configured to an integer from 0 through 65535.

neq dest_port

Specifies that all destination TCP port numbers not equal to the one specified are to be filtered.

dest_port must be configured to an integer from 0 through 65535.

Usage Guidelines

Use this command to define a rule that redirects packets to a different destination address. The TCP and UDP packet headers are modified with the new destination address and destination port.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule that redirects packets to the server at fe80::c0a8:a04 , UDP packets coming from any host with a destination of any host are matched:
readdress server fe80::c0a8:a04 udp any any  
The following sets the insertion point to before the rule defined above:
before readdress server fe80::c0a8:a04 udp any any  
The following deletes the rule defined above:
no readdress server fe80::c0a8:a04 udp any any  

redirect context (by IP address masking)

Used to redirect subscriber sessions based on the IP address mask sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect context  context_id [ log ]  source_address source_wildcard 
after redirect context  context_id [ log ]  source_address source_wildcard 
before redirect context  context_id [ log ]  source_address source_wildcard 
no redirect context  context_id [ log ]  source_address source_wildcard 

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

context context_id

Specifies the context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

source_address

Filters by the IP address(es) from which the packet originated. This option filters all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

Filters packets for a group of addresses specified in conjunction with the source_address option.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


Usage Guidelines

Define a rule when any packet from the IP addresses which fall into the group of addresses matching the IP address masking. This allows the reduction of redirect rules as it does not require a rule for each source and destination pair.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule that redirects packets to the context with the context ID of 23 and the source IP and wildcard of 2002::c6a2:1600 and 2002::c6a2:1600 :
redirect context 23 2002::c6a2:1600 2002::c6a2:1600  
The following sets the insertion point to before the first rule defined above:
before redirect context 23 2002::c6a2:1600 2002::c6a2:1600  
The following command sets the insertion point after the second rule defined above:
after redirect context 23 2002::c6a2:1600 2002::c6a2:1600  
The following deletes the first rule defined above:
no redirect context 23 2002::c6a2:1600 2002::c6a2:1600  

redirect context (any)

Used to redirect subscriber sessions based on any packet received. This command is also used to set the access control list insertion point.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect context  context_id [ log ] any  
after redirect context  context_id [ log ] any  
before redirect context  context_id [ log ] any  
no redirect context  context_id [ log ] any  

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

context context_id

The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

any

Indicates all packets will match the redirect regardless of source and/or destination.

Usage Guidelines

Define a catch all rule to place at the end of the list of rules to provide explicit handling of rules which do not fit any other criteria.


Important

It is suggested that any rule which is added to be a catch all should also have the log option specified. The logged packets may be used to determine if the current list of rules is adequate or needs modification to ensure proper security. The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule that redirects packets to the context with the context ID of 23 and any source IP:
redirect context 23 any  
The following sets the insertion point to before the first rule defined above:
before redirect context 23 any  
The following command sets the insertion point after the second rule defined above:
after redirect context 23 any  
The following deletes the first rule defined above:
no redirect context 23 any  

redirect context (by host IP address)

Used to redirect subscriber sessions based on the targeted host IP address sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect context  context_id [ log ] host  source_ip_address 
after redirect context  context_id [ log ] host  source_ip_address 
before redirect context  context_id [ log ] host  source_ip_address 
no redirect context  context_id [ log ] host  source_ip_address 

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

context context_id

The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

host

Specifies that the rule applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

Usage Guidelines

Define a rule when a very specific remote host is to be blocked. In simplified networks where the access controls need only block a few hosts, this command allows the rules to be very clear and concise.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule that redirects packets to the context with the context ID of 23 and a host IP address of fe80::c0a8:c80b :
redirect context 23 host fe80::c0a8:c80b  
The following sets the insertion point to before the first rule defined above:
before redirect context 23 host fe80::c0a8:c80b  
The following command sets the insertion point after the second rule defined above:
after redirect context 23 host fe80::c0a8:c80b  
The following deletes the first rule defined above:
no redirect context 23 host fe80::c0a8:c80b  

redirect context (by source ICMP packets)

Used to redirect subscriber sessions based on the internet control message protocol packets sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect context  context_id [ log ] icmp {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [  icmp_type [  icmp_code ] ]  
after redirect context  context_id [ log ] icmp {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [  icmp_type [  icmp_code ] ]  
before redirect context  context_id [ log ] icmp {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [  icmp_type [  icmp_code ] ]  
no redirect context  context_id [ log ] icmp {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [  icmp_type [  icmp_code ] ]  

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

context context_id

The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


any

Specifies that the rule applies to all packets.

host

Specifies that the rule applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


icmp_type

Specifies that all ICMP packets of a particular type are to be filtered. Type is an integer from 0 through 255.

icmp_code

Specifies that all ICMP packets of a particular code are to be filtered type is an integer from 0 through 255.

Usage Guidelines

Define a rule to block ICMP packets which can be used for address resolution and possibly be a security risk.

The IP redirecting allows flexible controls for pairs of individual hosts or groups by IP masking which allows the redirecting of entire subnets if necessary.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule that redirects packets to the context with the context ID of 23 , and ICMP packets coming from the host with the IP address 2002::c6a2:6419 :
redirect context 23 icmp host 2002::c6a2:6419  
The following sets the insertion point to before the first rule defined above:
before redirect context 23 icmp host 2002::c6a2:6419  
The following command sets the insertion point after the second rule defined above:
after redirect context 23 icmp host 2002::c6a2:6419  
The following deletes the first rule defined above:
no redirect context 23 icmp host 2002::c6a2:6419  

redirect context (by IP packets)

Used to redirect subscriber sessions based on the internet protocol packets sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect context  context_id [ log ] ip {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [ fragment ] [ protocol  num ]  
after redirect context  context_id [ log ] ip {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [ fragment ] [ protocol  num ]  
before redirect context  context_id [ log ] ip {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [ fragment ] [ protocol  num ]  
no redirect context  context_id [ log ] ip {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [ fragment ] [ protocol  num ]  

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

context context_id

The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


any

Specifies that the rule applies to all packets.

host

Specifies that the rule applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


fragment

Indicates packet redirection is to be applied to IP packet fragments only.

protocol num

Indicates that the packet filtering is to be applied to a specific protocol number.

num is an integer from 0 through 255.

Usage Guidelines

Block IP packets when the source and destination are of interest.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule that redirects packets to the context with the context ID of 23 , and IP packets coming from the host with the IP address 2002::c6a2:6419 , and fragmented packets for any destination are matched:
redirect context 23 ip host 2002::c6a2:6419 any fragment  
The following sets the insertion point to before the first rule defined above:
before redirect context 23 ip host 198.162.100.25 any fragment  
The following command sets the insertion point after the second rule defined above:
after redirect context 23 ip host 2002::c6a2:6419 any fragment  
The following deletes the first rule defined above:
no redirect context 23 ip host 2002::c6a2:6419 any fragment  

redirect context (by TCP/UDP packets)

Used to redirect subscriber sessions based on the transmission control protocol/user datagram protocol packets sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect context  context_id [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dst_port ] }  
after redirect context  context_id [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dst_port ] }  
before redirect context  context_id [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dst_port ] }  
no redirect context  context_id [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dst_port ] }  

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

context context_id

The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

tcp | udp

Specifies the redirect is to be applied to IP-based transmission control protocol or the user datagram protocol.

  • tcp : Redirect applies to TPC packets.

  • udp : Redirect applies to UDP packets.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


any

Specifies that the rule applies to all packets.

host

Specifies that the rule applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

eq source_port

Specifies a single, specific source TCP port number to be filtered.

source_port must be configured to an integer from 0 through 65535.

gt source_port

Specifies that all source TCP port numbers greater than the one specified are to be filtered.

source_port must be configured to an integer from 0 through 65535.

lt source_port

Specifies that all source TCP port numbers less than the one specified are to be filtered.

source_port must be configured to an integer from 0 through 65535.

neq source_port

Specifies that all source TCP port numbers not equal to the one specified are to be filtered.

source_port must be configured to an integer from 0 through 65535.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


eq dest_port

Specifies a single, specific destination TCP port number to be filtered.

dest_port must be configured to an integer from 0 through 65535.

gt dest_port

Specifies that all destination TCP port numbers greater than the one specified are to be filtered.

dest_port must be configured to an integer from 0 through 65535.

lt dest_port

Specifies that all destination TCP port numbers less than the one specified are to be filtered.

dest_port must be configured to an integer from 0 through 65535.

neq dest_port

Specifies that all destination TCP port numbers not equal to the one specified are to be filtered.

dest_port must be configured to an integer from 0 through 65535.

Usage Guidelines

Block IP packets when the source and destination are of interest but for only a limited set of ports.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule that redirects packets to the context with the context ID of 23 , and UDP packets coming from any host are matched:
redirect context 23 udp any  
The following sets the insertion point to before the rule defined above:
before redirect context 23 udp any  
The following command sets the insertion point after the rule defined above:
after redirect context 23 udp any  
The following deletes the rule defined above:
no redirect context 23 udp any  

redirect css delivery-sequence

This is a restricted command. In StarOS 9.0 and later, this command is obsoleted.

redirect css service (any)

Used to redirect subscriber sessions based on any packet received with Content Service Steering (CSS) enabled. This command is also used to set the access control list insertion point.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] any  
after redirect css service  svc_name [ log ] any  
before redirect css service  svc_name [ log ] any  
no redirect css service  svc_name [ log ] any  

after

Indicates all rule definitions defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definitions which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the CSS service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.

svc_name must be a string of 1 through 15 characters.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

any

Indicates all packets will match the redirect regardless of source and/or destination.

Usage Guidelines

Define a catch all rule definitions to place at the end of the list of rule definitions to provide explicit handling of rule definitions which do not fit any other criteria.


Important

It is suggested that any rule definition which is added to be a catch all should also have the log option specified. The logged packets may be used to determine if the current list of rule definitions is adequate or needs modification to ensure proper security.



Important

A maximum of 16 rule definitions can be configured per ACL.



Important

Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule definition that redirects packets to the CSS service with the name css-svc1 and any source IP:
redirect css service css-svc1 any  
The following sets the insertion point to before the first rule definition above:
before redirect css service css-svc1 any  
The following command sets the insertion point after the second rule definitions above:
after redirect css service css-svc1 any  
The following deletes the first rule definition above:
no redirect css service css-svc1 any  

redirect css service (by host IP address)

Used to redirect subscriber sessions based on the targeted host IP address sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] host  source_host_address 
after redirect css service  svc_name [ log ] host  source_host_address 
before redirect css service  svc_name [ log ] host  source_host_address 
no redirect css service  svc_name [ log ] host  source_host_address 

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.

svc_name must be an alphanumeric string of 1 through 15 characters.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

host

Specifies that the rule definition applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

Usage Guidelines

Define a rule definition when a very specific remote host is to be blocked. In simplified networks where the access controls need only block a few hosts, this command allows the rule definitions to be very clear and concise.


Important

A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule definition that redirects packets to the CSS service with the name css-svc1 and a host IP address of fe80::c0a8:c80b :
redirect css service css-svc1 host fe80::c0a8:c80b  
The following sets the insertion point to before the first rule definition above:
before redirect css service css-svc1 host fe80::c0a8:c80b  
The following command sets the insertion point after the second rule definition above:
after redirect css service css-svc1 host fe80::c0a8:c80b  
The following deletes the first rule definition above:
no redirect css service css-svc1 host fe80::c0a8:c80b  

redirect css service (by ICMP packets)

Used to redirect subscriber sessions based on the internet control message protocol packets sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] icmp { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ icmp_type [  icmp_code ] ]  
after redirect css service  svc_name [ log ] icmp { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ icmp_type [  icmp_code ] ]  
before redirect css service  svc_name [ log ] icmp { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ icmp_type [  icmp_code ] ]  
no redirect css service  svc_name [ log ] icmp { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ icmp_type [  icmp_code ] ]  

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured charging services.

svc_name must be an alphanumeric string of 1 through 15 characters.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


any

Specifies that the rule definition applies to all packets.

host

Specifies that the rule definition applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


icmp_type

Specifies that all ICMP packets of a particular type are to be filtered. The type can be an integer value from 0 through 255.

icmp_code

Specifies that all ICMP packets of a particular code are to be filtered. The type is an integer from 0 through 255.

Usage Guidelines

Define a rule definition to block ICMP packets which can be used for address resolution and possibly be a security risk.

The IP redirecting allows flexible controls for pairs of individual hosts or groups by IP masking which allows the redirecting of entire subnets if necessary.


Important

A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule definition that redirects packets to the CSS service named css-svc1 , and ICMP packets coming from the host with the IP address 2002::c6a2:6419 :
redirect css service css-svc1 icmp host 2002::c6a2:6419  
The following sets the insertion point to before the first rule definition above:
before redirect css service css-svc1 icmp host 2002::c6a2:6419   
The following command sets the insertion point after the second rule definition above:
after redirect css service css-svc1 icmp host 2002::c6a2:64195  
The following deletes the first rule definition above:
no redirect css service css-svc1 icmp host 2002::c6a2:6419  

redirect css service (by IP packets)

Used to redirect subscriber sessions based on the internet protocol packets sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] ip { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ fragment ]  
after redirect css service  svc_name [ log ] ip { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ fragment ]  
before redirect css service  svc_name [ log ] ip { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ fragment ]  
no redirect css service  svc_name [ log ] ip { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ fragment ]  

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.

svc_name must be an alphanumeric string of 1 through 15 characters.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


any

Specifies that the rule definition applies to all packets.

host

Specifies that the rule definition applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore, allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.


fragment

Indicates packet redirection is to be applied to IP packet fragments only.

Usage Guidelines

Block IP packets when the source and destination are of interest.


Important

A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule definition that redirects packets to the CSS service named css-svc1 , and IP packets coming from the host with the IP address 2002::c6a2:6419 , and fragmented packets for any destination are matched:
redirect css service css-svc1 ip host 2002::c6a2:6419 any fragment  
The following sets the insertion point to before the first rule definition above:
before redirect css service css-svc1 ip host 2002::c6a2:6419 any fragment  
The following command sets the insertion point after the second rule definition above:
after redirect css service css-svc1 ip host 2002::c6a2:6419 any fragment  
The following deletes the first rule definition above:
no redirect css service css-svc1 ip host 2002::c6a2:6419 any fragment  

redirect css service (by source IP address masking)

Used to redirect subscriber sessions based on the IP address mask sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ]  source_address source_wildcard 
after redirect css service  svc_name [ log ]  source_address source_wildcard 
before redirect css service  svc_name [ log ]  source_address source_wildcard 
no redirect css service  svc_name [ log ]  source_address source_wildcard 

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.

svc_name must be an alphanumeric string of 1 through 15 characters.

log

Default: packets are not logged.

Indicates all packets which match the filter are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


Usage Guidelines

Define a rule definition when any packet from the IP addresses which fall into the group of addresses matching the IP address masking. This allows the reduction of filtering rule definitions as it does not require a rule definition for each source and destination pair.


Important

A maximum of 16 rule definitions can be configured per ACL.


Examples

The following command defines a rule definition to redirect packets to a CSS service named css-svc1 :
redirect css service css=svc1 2002::c6a2:6419   

redirect css service (by TCP/UDP packets)

Used to redirect subscriber sessions based on the transmission control protocol/user datagram protocol packets sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port | range  start_source_port end_source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port | range  start_dest_port end_dest_port ] }  
after redirect css service  svc_name [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port | range  start_source_port end_source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port | range  start_dest_port end_dest_port ] }  
after redirect css service  svc_name [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port | range  start_source_port end_source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port | range  start_dest_port end_dest_port ] }  
no redirect css service  svc_name [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port | range  start_source_port end_source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port | range  start_dest_port end_dest_port ] }  

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured charging services.

svc_name must be an alphanumeric string of 1 through 15 characters.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

tcp | udp

Specifies the redirect is to be applied to IP-based transmission control protocol or the user datagram protocol.

  • tcp : Redirect applies to TPC packets.

  • udp : Redirect applies to UDP packets.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


any

Specifies that the rule definition applies to all packets.

host

Specifies that the rule definition applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon notation.

eq source_port

Specifies a single, specific source TCP port number to be filtered.

source_port must be configured to an integer from 0 to 65535.

gt source_port

Specifies that all source TCP port numbers greater than the one specified are to be filtered.

source_port must be configured to an integer from 0 to 65535.

lt source_port

Specifies that all source TCP port numbers less than the one specified are to be filtered.

source_port must be configured to an integer from 0 to 65535.

neq source_port

Specifies that all source TCP port numbers not equal to the one specified are to be filtered.

source_port must be configured to an integer from 0 to 65535.

range start_source_port end_source_port

Specifies that all source TCP ports within a specific range are to be filtered.

start_source_port is the initial port in the range and end_source_port is the final port in the range.

Both start_source_port and end_source_port can be configured to an integer from 0 to 65535.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


eq dest_port

Specifies a single, specific destination TCP port number to be filtered.

dest_port must be configured to an integer from 0 to 65535.

gt dest_port

Specifies that all destination TCP port numbers greater than the one specified are to be filtered.

dest_port must be configured to an integer from 0 to 65535.

lt dest_port

Specifies that all destination TCP port numbers less than the one specified are to be filtered.

dest_port must be configured to an integer from 0 to 65535.

neq dest_port

Specifies that all destination TCP port numbers not equal to the one specified are to be filtered.

dest_port must be configured to an integer from 0 to 65535.

range start_dest_port end_dest_port

Specifies that all destination TCP ports within a specific range are to be filtered.

start_dest_port is the initial port in the range and end_dest_port is the final port in the range.

Both start_dest_port and end_dest_port can be configured to an integer from 0 to 65535

Usage Guidelines

Block IP packets when the source and destination are of interest but for only a limited set of ports.


Important

A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule definition that redirects packets to the CSS service named css-svc1 , and UDP packets coming from any host are matched:
redirect css service css-svc1 udp any  
The following sets the insertion point to before the rule definition above:
before redirect css service css-svc1 udp any  
The following command sets the insertion point after the rule definition above:
after redirect css service css-svc1 udp any  
The following deletes the rule definition above:
no redirect css service css-svc1 udp any  

redirect css service (for downlink, any)

Used to redirect subscriber sessions based on any packet received in the downlink (from the Mobile Node) direction. This command is also used to set the access control list insertion point.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] downlink any  
after redirect css service  svc_name [ log ] downlink any  
before redirect css service  svc_name [ log ] downlink any  
no redirect css service  svc_name [ log ] downlink any  

after

Indicates all rule definitions defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.

svc_name must be an alphanumeric string of 1 through 15 characters.

downlink

Apply this rule definition only to packets in the downlink (from the Mobile Node) direction.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

any

Indicates all packets will match the redirect regardless of source and/or destination.

Usage Guidelines

Define a catch all rule definition to place at the end of the list of rule definitions to provide explicit handling of rule definitions which do not fit any other criteria.


Important

It is suggested that any rule definition which is added to be a catch all should also have the log option specified. The logged packets may be used to determine if the current list of rule definitions is adequate or needs modification to ensure proper security.



Important

A maximum of 16 rule definitions can be configured per ACL.



Important

Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule definition that redirects packets to the CSS service with the name css-svc1 and any source IP:
redirect css service css-svc1 downlink any  
The following sets the insertion point to before the first rule definition above:
before redirect service css-svc1 downlink any  
The following command sets the insertion point after the second rule definition above:
after redirect service css-svc1 downlink any  chgsvc1 downlink any  
The following deletes the first rule definition above:
no redirect service css-svc1 downlink any  

redirect css service (for downlink, by host IP address)

Used to redirect subscriber sessions based on the targeted host IP address in the downlink (from the Mobile Node) direction.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] downlink host  source_host_address 
after redirect css service  svc_name [ log ] downlink host  source_host_address 
before redirect css service  svc_name [ log ] downlink host  source_host_address 
no redirect css service  svc_name [ log ] downlink host  source_host_address 

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.

svc_name must be an alphanumeric string of 1 through 15 characters.

downlink

Apply this rule definition only to packets in the downlink (from the Mobile Node) direction.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

host

Specifies that the rule definition applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

Usage Guidelines

Define a rule definition when a very specific remote host is to be blocked. In simplified networks where the access controls need only block a few hosts, this command allows the rule definitions to be very clear and concise.


Important

A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule definition that redirects packets to the charging service with the name css-svc1 and a host IP address of fe80::c0a8:c80b :
redirect service css-svc1 downlink host fe80::c0a8:c80b  
The following sets the insertion point to before the first rule definition above:
before redirect service css-svc1 downlink host fe80::c0a8:c80b  
The following command sets the insertion point after the second rule definition above:
after redirect service css-svc1 downlink host fe80::c0a8:c80b  
The following deletes the first rule definition above:
no redirect service css-svc1 downlink host fe80::c0a8:c80b  

redirect css service (for downlink, by ICMP packets)

Used to redirect subscriber sessions based on the internet control message protocol packets in the downlink (from the Mobile Node) direction.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] downlink icmp { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [  icmp_type [  icmp_code ] ]  
after redirect css service  svc_name [ log ] downlink icmp { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [  icmp_type [  icmp_code ] ]  
before redirect css service  svc_name [ log ] downlink icmp { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [  icmp_type [  icmp_code ] ]  
no redirect css service  svc_name [ log ] downlink icmp { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [  icmp_type [  icmp_code ] ]  

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.

svc_name must be an alphanumeric string of 1 through 15 characters.

downlink

Apply this rule definition only to packets in the downlink (from the Mobile Node) direction.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


any

Specifies that the rule definition applies to all packets.

host

Specifies that the rule definition applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


icmp_type

Specifies that all ICMP packets of a particular type are to be filtered. The type can be an integer value from 0 through 255.

icmp_code

Specifies that all ICMP packets of a particular code are to be filtered. The type can be an integer value from 0 through 255.

Usage Guidelines

Define a rule definition to block ICMP packets which can be used for address resolution and possibly be a security risk.

The IP redirecting allows flexible controls for pairs of individual hosts or groups by IP masking which allows the redirecting of entire subnets if necessary.


Important

A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule definition that redirects packets to the charging service named css-svc1 , and ICMP packets coming in the downlink (from the Mobile Node) direction from the host with the IP address 2002::c6a2:6419 :
redirect css service css-svc1 downlink icmp host 2002::c6a2:6419  
The following sets the insertion point to before the first rule definition above:
before redirect css service css-svc1 downlink icmp host 2002::c6a2:6419  
The following command sets the insertion point after the second rule definition above:
after redirect css service css-svc1 downlink icmp host 2002::c6a2:6419  
The following deletes the first rule definition above:
no redirect css service css-svc1 downlink icmp host 2002::c6a2:6419  

redirect css service (for downlink, by IP packets)

Used to redirect subscriber sessions based on the internet protocol packets in the downlink (from the Mobile Node) direction.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] downlink ip { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ fragment ]  
after redirect css service  svc_name [ log ] downlink ip { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ fragment ]  
before redirect css service  svc_name [ log ] downlink ip { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ fragment ]  
no redirect css service  svc_name [ log ] downlink ip { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ fragment ]  

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.

svc_name must be a string of 1 through 15 characters.

downlink

Apply this rule definition only to packets in the downlink (from the Mobile Node) direction.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore, allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.


any

Specifies that the rule definition applies to all packets.

host

Specifies that the rule definition applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon notation.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


fragment

Indicates packet redirection is to be applied to IP packet fragments only.

Usage Guidelines

Block IP packets when the source and destination are of interest.


Important

A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule definition that redirects packets to the charging service named css-svc1 , and downlink IP packets coming from the host with the IP address 2002::c6a2:6419 , and fragmented packets for any destination are matched:
redirect css service css-svc1 downlink ip host 2002::c6a2:6419 any fragment  
The following sets the insertion point to before the first rule definition above:
before redirect css service css-svc1 downlink ip host 2002::c6a2:6419 any fragment  
The following command sets the insertion point after the second rule definition above:
after redirect css service css-svc1 downlink ip host 2002::c6a2:6419 any fragment  
The following deletes the first rule definition above:
no redirect css service css-svc1 downlink ip host 2002::c6a2:6419 any fragment  

redirect css service (for downlink, by source IP address masking)

Used to redirect subscriber sessions based on the IP address mask sent by the source in the downlink (from the Mobile Node) direction.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] downlink  source_address source_wildcard 
after redirect css service  svc_name [ log ] downlink  source_address source_wildcard 
before redirect css service  svc_name [ log ] downlink  source_address source_wildcard 
no redirect css service  svc_name [ log ] downlink  source_address source_wildcard 

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.

svc_name must be an alphanumeric string of 1 through 15 characters.

downlink

Apply this rule definition only to packets in the downlink (from the Mobile Node) direction.

log

Default: packets are not logged.

Indicates all packets which match the filter are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


Usage Guidelines

Define a rule definition when any packet from the IP addresses which fall into the group of addresses matching the IP address masking. This allows the reduction of filtering rule definitions as it does not require a rule definition for each source and destination pair.


Important

A maximum of 16 rule definitions can be configured per ACL.


Examples

The following command defines a rule definition to redirect packets to a charging service named css-svc1 :
redirect css service css-svc1 donwlink fe80::c0a8:a04  

redirect css service (for downlink, by TCP/UDP packets)

Used to redirect subscriber sessions to a charging service based on the transmission control protocol/user datagram protocol packets in the downlink (from the Mobile Node) direction.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] downlink { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port | range  start_source_port end_source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port | range  start_dest_port end_dest_port ] }  
after redirect css service  svc_name [ log ] downlink { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port | range  start_source_port end_source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port | range  start_dest_port end_dest_port ] }  
after redirect css service  svc_name [ log ] downlink { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port | range  start_source_port end_source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port | range  start_dest_port end_dest_port ] }  
no redirect css service  svc_name [ log ] downlink { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port | range  start_source_port end_source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port | range  start_dest_port end_dest_port ] }  

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.

svc_name must be an alphanumeric string of 1 through 15 characters.

downlink

Apply this rule definition only to packets in the downlink (from the Mobile Node) direction.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

tcp | udp

Specifies the redirect is to be applied to IP-based transmission control protocol or the user datagram protocol.

  • tcp : Redirect applies to TPC packets.

  • udp : Redirect applies to UDP packets.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


any

Specifies that the rule definition applies to all packets.

host

Specifies that the rule definition applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

eq source_port

Specifies a single, specific source TCP port number to be filtered.

source_port must be configured to an integer value from 0 to 65535.

gt source_port

Specifies that all source TCP port numbers greater than the one specified are to be filtered.

source_port must be configured to an integer value from 0 to 65535.

lt source_port

Specifies that all source TCP port numbers less than the one specified are to be filtered.

source_port must be configured to an integer value from 0 to 65535.

neq source_port

Specifies that all source TCP port numbers not equal to the one specified are to be filtered.

source_port must be configured to an integer value from 0 to 65535.

range start_source_port end_source_port

Specifies that all source TCP ports within a specific range are to be filtered.

start_source_port is the initial port in the range and end_source_port is the final port in the range.

Both start_source_port and end_source_port can be configured to an integer value from 0 to 65535.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


eq dest_port

Specifies a single, specific destination TCP port number to be filtered.

dest_port must be configured to an integer value from 0 to 65535.

gt dest_port

Specifies that all destination TCP port numbers greater than the one specified are to be filtered.

dest_port must be configured to an integer value from 0 to 65535.

lt dest_port

Specifies that all destination TCP port numbers less than the one specified are to be filtered.

dest_port must be configured to an integer value from 0 to 65535.

neq dest_port

Specifies that all destination TCP port numbers not equal to the one specified are to be filtered.

dest_port must be configured to an integer value from 0 to 65535.

range start_dest_port end_dest_port

Specifies that all destination TCP ports within a specific range are to be filtered.

start_dest_port is the initial port in the range and end_dest_port is the final port in the range.

Both start_dest_port and end_dest_port can be configured to an integer value from 0 to 65535.

Usage Guidelines

Block IP packets when the source and destination are of interest but for only a limited set of ports.


Important

A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule definition that redirects packets to the charging service named css-svc1 , and UDP packets coming from any host are matched:
redirect css service css-svc1 downlink udp any  
The following sets the insertion point to before the rule definition above:
before redirect css service css-svc1 downlink udp any  
The following command sets the insertion point after the rule definition above:
after redirect css service css-svc1 downlink udp any  
The following deletes the rule definition above:
no redirect css service css-svc1 downlink udp any  

redirect css service (for uplink, any)

Used to redirect subscriber sessions based on any packet received in the uplink (to the Mobile Node) direction. This command is also used to set the access control list insertion point.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] uplink any  
after redirect css service  svc_name [ log ] uplink any  
before redirect css service  svc_name [ log ] uplink any  
no redirect css service  svc_name [ log ] uplink any  

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the Content Service steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.

svc_name must be an alphanumeric string of 1 through 15 characters.

uplink

Apply this rule definition only to packets in the uplink (to the Mobile Node) direction.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

any

Indicates all packets will match the redirect regardless of source and/or destination.

Usage Guidelines

Define a catch all rule definition to place at the end of the list of rule definitions to provide explicit handling of rule definitions which do not fit any other criteria.


Important

It is suggested that any rule definition which is added to be a catch all should also have the log option specified. The logged packets may be used to determine if the current list of rule definitions is adequate or needs modification to ensure proper security.



Important

A maximum of 16 rule definitions can be configured per ACL.



Important

Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule definition that redirects packets to the charging service with the name css-svc1 and any source IP:
redirect css service css-svc1 uplink any  
The following sets the insertion point to before the first rule definition above:
before redirect css service css-svc1 uplink any  
The following command sets the insertion point after the second rule definition above:
after redirect css service css-svc1 uplink any  
The following deletes the first rule definition above:
no redirect css service css-svc1 uplink any  

redirect css service (for uplink, by host IP address)

Used to redirect subscriber sessions based on the targeted host IP address in the uplink (to the Mobile Node) direction.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] uplink host  source_host_address 
after redirect css service  svc_name [ log ] uplink host  source_host_address 
before redirect css service  svc_name [ log ] uplink host  source_host_address 
no redirect css service  svc_name [ log ] uplink host  source_host_address 

uplink

Apply this rule definition only to packets in the uplink (to the Mobile Node) direction.

after

Indicates all rule definitions defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the Content service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.

svc_name must ben alphanumeric string of 1 through 15 characters.

uplink

Apply this rule definition only to packets in the uplink (to the Mobile Node) direction.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

host

Specifies that the rule definition applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon notation.

Usage Guidelines

Define a rule definition when a very specific remote host is to be blocked. In simplified networks where the access controls need only block a few hosts, this command allows the rule definitions to be very clear and concise.


Important

A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule definition that redirects packets to the charging service with the name css-svc1 and a host IP address of fe80::c0a8:c80b :
redirect service css-svc1 uplink host fe80::c0a8:c80b  
The following sets the insertion point to before the first rule definition above:
before redirect service css-svc1 uplink host fe80::c0a8:c80b  
The following command sets the insertion point after the second rule definition above:
after redirect service css-svc1 uplink host fe80::c0a8:c80b  
The following deletes the first rule definition above:
no redirect service css-svc1 uplink host fe80::c0a8:c80b  

redirect css service (for uplink, by ICMP packets)

Used to redirect subscriber sessions based on the internet control message protocol packets in the uplink (to the Mobile Node) direction.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service svc_name [ log ] uplink icmp { any | host source_host_address | source_address source_wildcard } { any | host dest_host_address | dest_address dest_wildcard } [ icmp_type [ icmp_code ] ]

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the Content Service Steering (CSS) service to which packets are to be redirected. At the executive mode prompt, use the show css service all command to display the names of all configured CSS services.

svc_name must be an alphanumeric string of 1 through 15 characters.

uplink

Apply this rule definition only to packets in the uplink (to the Mobile Node) direction.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


any

Specifies that the rule definition applies to all packets.

host

Specifies that the rule definition applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


icmp_type

Specifies that all ICMP packets of a particular type are to be filtered. The type can be an integer value from 0 through 255.

icmp_code

Specifies that all ICMP packets of a particular code are to be filtered. The type can be an integer value from 0 through 255.

Usage Guidelines

Define a rule definition to block ICMP packets which can be used for address resolution and possibly be a security risk.

The IP redirecting allows flexible controls for pairs of individual hosts or groups by IP masking which allows the redirecting of entire subnets if necessary.


Important

A maximum of 16 rule definitions can be configured per ACL. Also note that "redirect" rule definitions are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule definition that redirects packets to the charging service named chgsvc1 , and ICMP packets in the uplink (to the Mobile Node) direction from the host with the IP address 198.162.100.25 :
redirect css service chgsvc1 uplink icmp host 198.162.100.25  
The following sets the insertion point to before the first rule definition above:
before redirect css service chgsvc1 uplink icmp host 198.162.100.25  
The following command sets the insertion point after the second rule definition above:
after redirect css service chgsvc1 uplink icmp host 198.162.100.25  
The following deletes the first rule definition above:
no redirect css service chgsvc1 uplink icmp host 198.162.100.25  

redirect css service (for uplink, by IP packets)

Used to redirect subscriber sessions based on the internet protocol packets in the uplink (to the Mobile Node) direction.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] uplink ip { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ fragment ]  
after redirect css service  svc_name [ log ] uplink ip { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ fragment ]  
before redirect css service  svc_name [ log ] uplink ip { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ fragment ]  
no redirect css service  svc_name [ log ] uplink ip { any | host  source_host_address |  source_address source_wildcard } { any | host  dest_host_address |  dest_address dest_wildcard } [ fragment ]  

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


before

Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.


Important

If the options specified do not exactly match an existing rule definition, the insertion point does not change.


no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the active charging service to which packets are to be redirected. At the executive mode prompt, use the show active-charging service all command to display the names of all configured charging services.

svc_name must be a string of 1 through 15 characters.

uplink

Apply this rule definition only to packets in the uplink (to the Mobile Node) direction.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore, allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.


any

Specifies that the rule definition applies to all packets.

host

Specifies that the rule definition applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon notation.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.

fragment

Indicates packet redirection is to be applied to IP packet fragments only.

Usage Guidelines

Block IP packets when the source and destination are of interest.

Examples

The following command defines a rule definition that redirects packets to the charging service named chgsvc1 , and uplink IP packets going to the host with the IP address 198.162.100.25 , and fragmented packets for any destination are matched:
redirect css service chgsvc1 uplink ip host 198.162.100.25 any fragment  
The following sets the insertion point to before the first rule definition above:
redirect css service chgsvc1 uplink ip host 198.162.100.25 any fragment  
The following command sets the insertion point after the second rule definition above:
after redirect css service chgsvc1 uplink ip host 198.162.100.25 any fragment  
The following deletes the first rule definition above:
no redirect css service chgsvc1 uplink ip host 198.162.100.25 any fragment  

redirect css service (for uplink, by source IP address masking)

Used to redirect subscriber sessions based on the IP address mask sent by the source in the uplink (to the Mobile Node) direction.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service svc_name [ log ] uplink source_address source_wildcard

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.

before

Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.

no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the active charging service to which packets are to be redirected. At the executive mode prompt, use the show active-charging service all command to display the names of all configured charging services.

svc_name must be a string of 1 through 15 characters.

uplink

Apply this rule definition only to packets in the uplink (to the Mobile Node) direction.

log

Default: packets are not logged.

Indicates all packets which match the filter are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.

Usage Guidelines

Define a rule definition when any packet from the IP addresses which fall into the group of addresses matching the IP address masking. This allows the reduction of filtering rule definitions as it does not require a rule definition for each source and destination pair.

Examples

The following command defines a rule definition to redirect packets to a charging service named chgsvc1 :
redirect css service chgsvc1 uplink 1:1:1:1:1:1:1:1  

redirect css service (for uplink, by TCP/UDP packets)

Used to redirect subscriber sessions to a charging service based on the transmission control protocol/user datagram protocol packets in the uplink (to the Mobile Node) direction.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect css service  svc_name [ log ] uplink { tcp | udp } { {  source_address source_wildcard | any |  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port | range  start_source_port end_source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port | range  start_dest_port end_dest_port ] }  
after redirect css service  svc_name [ log ] uplink { tcp | udp } { {  source_address source_wildcard | any |  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port | range  start_source_port end_source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port | range  start_dest_port end_dest_port ] }  
before redirect css service  svc_name [ log ] uplink { tcp | udp } { {  source_address source_wildcard | any |  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port | range  start_source_port end_source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port | range  start_dest_port end_dest_port ] }  
no redirect css service  svc_name [ log ] uplink { tcp | udp } { {  source_address source_wildcard | any |  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port | range  start_source_port end_source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port | range  start_dest_port end_dest_port ] }  

after

Indicates all rule definitions subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule definition which matches the exact options specified such that new rule definitions will be added, in order, after the matching rule definition.

before

Indicates all rule definitions subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule definition which matches the exact options specified such that new rule definitions will be added, in order, before the matching rule definition.

no

Removes the rule definition which exactly matches the options specified.

css service svc_name

The name of the active charging service to which packets are to be redirected. At the executive mode prompt, use the show active-charging service all command to display the names of all configured charging services.

svc_name must be a string of 1 through 15 characters.

uplink

Apply this rule definition only to packets in the uplink (to the Mobile Node) direction.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

tcp | udp

Specifies the redirect is to be applied to IP-based transmission control protocol or the user datagram protocol.

  • tcp : Redirect applies to TPC packets.

  • udp : Redirect applies to UDP packets.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.

any

Specifies that the rule definition applies to all packets.

host

Specifies that the rule definition applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon notation.

eq source_port

Specifies a single, specific source TCP port number to be filtered.

source_port must be configured to an integer value from 0 to 65535.

gt source_port

Specifies that all source TCP port numbers greater than the one specified are to be filtered.

source_port must be configured to an integer value from 0 to 65535.

lt source_port

Specifies that all source TCP port numbers less than the one specified are to be filtered.

source_port must be configured to an integer value from 0 to 65535.

neq source_port

Specifies that all source TCP port numbers not equal to the one specified are to be filtered.

source_port must be configured to an integer value from 0 to 65535.

range start_source_port end_source_port

Specifies that all source TCP ports within a specific range are to be filtered.

start_source_port is the initial port in the range and end_source_port is the final port in the range.

Both start_source_port and end_source_port can be configured to an integer value from 0 to 65535.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.

eq dest_port

Specifies a single, specific destination TCP port number to be filtered.

dest_port must be configured to an integer value from 0 to 65535.

gt dest_port

Specifies that all destination TCP port numbers greater than the one specified are to be filtered.

dest_port must be configured to an integer value from 0 to 65535.

lt dest_port

Specifies that all destination TCP port numbers less than the one specified are to be filtered.

dest_port must be configured to an integer value from 0 to 65535.

neq dest_port

Specifies that all destination TCP port numbers not equal to the one specified are to be filtered.

dest_port must be configured to an integer value from 0 to 65535.

range start_dest_port end_dest_port

Specifies that all destination TCP ports within a specific range are to be filtered.

start_dest_port is the initial port in the range and end_dest_port is the final port in the range.

Both start_dest_port and end_dest_port can be configured to an integer value from 0 to 65535.

Usage Guidelines

Block IP packets when the source and destination are of interest but for only a limited set of ports.

Examples

The following command defines a rule definition that redirects packets to the charging service named chgsvc1 , and UDP packets coming from any host are matched:
redirect css service chgsvc1 uplink udp any  
The following sets the insertion point to before the rule definition above:
before redirect css service chgsvc1 uplink udp any  
The following command sets the insertion point after the rule definition above:
after redirect css service chgsvc1 uplink udp any  
The following deletes the rule definition above:
no redirect css service chgsvc1 uplink udp any  

redirect nexthop (by IP address masking)

Used to redirect subscriber sessions based on the IP address mask sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ]  source_address source_wildcard 
after redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ]  source_address source_wildcard 
before redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ]  source_address source_wildcard 
no redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ]  source_address source_wildcard 

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

nexthop nexthop_addr

The IP address to which the IP packets are redirected.

context context_id

The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.

interface interface_name

The name of the logical interface to which the packets should be redirected. interface_name must be an alpha and/or numeric string from 1 to 79 characters.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore, allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.


Usage Guidelines

Define a rule when any packet from the IP addresses which fall into the group of addresses matching the IP address masking. This allows the reduction of redirect rules as it does not require a rule for each source and destination pair.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule that redirects packets to the next hop host at 192.168.10.4 , the context with the context ID of 23 and the source IP and wildcard of 198.162.22.0 and 0.0.0.31 :
redirect nexthop 192.168.10.4 context 23 198.162.22.0 0.0.0.31  
The following sets the insertion point to before the first rule defined above:
before redirect nexthop 192.168.10.4 context 23 198.162.22.0 0.0.0.31  
The following command sets the insertion point after the second rule defined above:
after redirect nexthop 192.168.10.4 context 23 198.162.22.0 0.0.0.31  
The following deletes the first rule defined above:
no redirect nexthop 192.168.10.4 context 23 198.162.22.0 0.0.0.31  

redirect nexthop (any)

Used to redirect subscriber sessions based on any packet received. This command is also used to set the access control list insertion point.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] any  
after redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] any  
before redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] any  
no redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] any  

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

nexthop nexthop_addr

The IP address to which the IP packets are redirected.

context context_id

The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.

interface interface_name

The name of the logical interface to which the packets should be redirected. interface_name must be an alpha and/or numeric string from 1 to 79 characters.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

any

Indicates all packets will match the redirect regardless of source and/or destination.

Usage Guidelines

Define a catch all rule to place at the end of the list of rules to provide explicit handling of rules which do not fit any other criteria.


Important

It is suggested that any rule which is added to be a catch all should also have the log option specified. The logged packets may be used to determine if the current list of rules is adequate or needs modification to ensure proper security. The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule that redirects packets to the next hop host at 192.168.10.4 , the context with the context ID of 23 and any source IP:
redirect nexthop 192.168.10.4 context 23 any  
The following sets the insertion point to before the first rule defined above:
before redirect nexthop 192.168.10.4 context 23 any  
The following command sets the insertion point after the second rule defined above:
after redirect nexthop 192.168.10.4 context 23 any  
The following deletes the first rule defined above:
no redirect nexthop 192.168.10.4 context 23 any  

redirect nexthop (by host IP address)

Used to redirect subscriber sessions based on the targeted host IP address sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] host  source_ip_address 
after redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] host  source_ip_address 
before redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] host  source_ip_address 
no redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] host  source_ip_address 

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

nexthop nexthop_addr

The IP address to which the IP packets are redirected.

context context_id

The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.

interface interface_name

The name of the logical interface to which the packets should be redirected. interface_name must be an alpha and/or numeric string from 1 to 79 characters.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

host

Specifies that the rule applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon notation.

Usage Guidelines

Define a rule when a very specific remote host is to be blocked. In simplified networks where the access controls need only block a few hosts, this command allows the rules to be very clear and concise.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule that redirects packets to the next hop host at 192.168.10.4 , the context with the context ID of 23 and a host IP address of 192.168.200.11 :
redirect nexthop 192.168.10.4 context 23 host 192.168.200.11  
The following sets the insertion point to before the first rule defined above:
before redirect nexthop 192.168.10.4 context 23 host 192.168.200.11  
The following command sets the insertion point after the second rule defined above:
after redirect nexthop 192.168.10.4 context 23 host 192.168.200.11  
The following deletes the first rule defined above:
no redirect nexthop 192.168.10.4 context 23 host 192.168.200.11  

redirect nexthop (by source ICMP packets)

Used to redirect subscriber sessions based on the internet control message protocol packets sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] icmp {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [  icmp_type [  icmp_code ] ]  
after redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] icmp {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [  icmp_type [  icmp_code ] ]  
before redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] icmp {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [  icmp_type [  icmp_code ] ]  
no redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] icmp {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [  icmp_type [  icmp_code ] ]  

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

nexthop nexthop_addr

The IP address to which the IP packets are redirected.

context context_id

The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.

interface interface_name

The name of the logical interface to which the packets should be redirected. interface_name must be an alpha and/or numeric string from 1 to 79 characters.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore, allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.


any

Specifies that the rule applies to all packets.

host

Specifies that the rule applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon notation.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


icmp_type

Specifies that all ICMP packets of a particular type are to be filtered. The type can be an integer value from 0 through 255.

icmp_code

Specifies that all ICMP packets of a particular code are to be filtered. The type can be an integer value from 0 through 255.

Usage Guidelines

Define a rule to block ICMP packets which can be used for address resolution and possible be a security risk.

The IP redirecting allows flexible controls for pairs of individual hosts or groups by IP masking which allows the redirecting of entire subnets if necessary.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule that redirects packets to the next hop host at fe80::c0a8:a04 , the context with the context ID of 23 , and ICMP packets coming from the host with the IP address 2002::c6a2:64195 :
redirect nexthop fe80::c0a8:a04 context 23 icmp host 2002::c6a2:6419  
The following sets the insertion point to before the first rule defined above:
before redirect nexthop fe80::c0a8:a04 context 23 icmp host 2002::c6a2:6419  
The following command sets the insertion point after the second rule defined above:
after redirect nexthop fe80::c0a8:a04 context 23 icmp host 2002::c6a2:6419  
The following deletes the first rule defined above:
no redirect nexthop fe80::c0a8:a04 context 23 icmp host 2002::c6a2:6419  

redirect nexthop (by IP packets)

Used to redirect subscriber sessions based on the internet protocol packets sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] ip {  source_address source_wildcard | any | host  source_host_address } {  dest_address dest_wildcard | any | host  dest_host_address } [ fragment ] [ protocol  num ]  

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to be immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

nexthop nexthop_addr

The IP address to which the IP packets are redirected.

context context_id

The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.

interface interface_name

The name of the logical interface to which the packets should be redirected. interface_name must be an alphanumeric string from 1 through 79 characters.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


any

Specifies that the rule applies to all packets.

host

Specifies that the rule applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


fragment

Indicates packet redirection is to be applied to IP packet fragments only.

protocol num

Indicates that the packet filtering is to be applied to a specific protocol number.

num can be an integer from 0 through 255.

Usage Guidelines

Block IP packets when the source and destination are of interest.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


redirect nexthop (by TCP/UDP packets)

Used to redirect subscriber sessions based on the transmission control protocol/user datagram protocol packets sent by the source to the mobile node or the network.

Product

All

Privilege

Security Administrator, Administrator

Mode

Exec > Global Configuration > Context Configuration > IPv6 ACL Configuration

configure > context context_name > ipv6 access-list ipv6_acl_name

Entering the above command sequence results in the following prompt:

[context_name]host_name(config-ipv6-acl)# 

Syntax

redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port ] }  
after redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port ] }  
before redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port ] }  
no redirect nexthop  nexthop_addr { context  context_id | interface  interface_name } [ log ] { tcp | udp } { {  source_address source_wildcard | any | host  source_host_address } [ eq  source_port | gt  source_port | lt  source_port | neq  source_port ] } { {  dest_address dest_wildcard | any | host  dest_host_address } [ eq  dest_port | gt  dest_port | lt  dest_port | neq  dest_port ] }  

after

Indicates all rules defined subsequent to this command are to be inserted after the command identified by the exact options listed.

This moves the insertion point to immediately after the rule which matches the exact options specified such that new rules will be added, in order, after the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


before

Indicates all rules defined subsequent to this command are to be inserted before the command identified by the exact options listed.

This moves the insertion point to be immediately before the rule which matches the exact options specified such that new rules will be added, in order, before the matching rule.


Important

If the options specified do not exactly match an existing rule, the insertion point does not change.


no

Removes the rule which exactly matches the options specified.

nexthop nexthop_addr

The IP address to which the IP packets are redirected.

context context_id

The context identification number of the context to which packets are redirected. At the executive mode prompt, use the show context all command to display context names and context IDs.

interface interface_name

The name of the logical interface to which the packets should be redirected. interface_name must be an alphanumeric string from 1 through 79 characters.

log

Default: packets are not logged.

Indicates all packets which match the redirect are to be logged.

tcp | udp

Specifies the redirect is to be applied to IP-based transmission control protocol or the user datagram protocol.

  • tcp : Redirect applies to TCP packets.

  • udp : Redirect applies to UDP packets.

source_address

The IP address(es) form which the packet originated.

This option is used to filter all packets from a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this option. The range can then be configured using the source_wildcard parameter.

source_wildcard

This option is used in conjunction with the source_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the source_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB).


any

Specifies that the rule applies to all packets.

host

Specifies that the rule applies to a specific host as determined by its IP address.

source_host_address

The IP address of the source host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

dest_host_address

The IP address of the destination host to filter against expressed in IPv6 colon-separated-hexadecimal notation.

eq source_port

Specifies a single, specific source TCP port number to be filtered.

source_port must be configured to an integer value from 0 to 65535.

gt source_port

Specifies that all source TCP port numbers greater than the one specified are to be filtered.

source_port must be configured to an integer value from 0 to 65535.

lt source_port

Specifies that all source TCP port numbers less than the one specified are to be filtered.

source_port must be configured to an integer value from 0 to 65535.

neq source_port

Specifies that all source TCP port numbers not equal to the one specified are to be filtered.

source_port must be configured to an integer value from 0 to 65535.

dest_address

The IP address(es) to which the packet is to be sent.

This option is used to filter all packets to a specific IP address or a group of IP addresses.

When specifying a group of addresses, the initial address is configured using this parameter. The range can then be configured using the dest_wildcard parameter.

dest_wildcard

This option is used in conjunction with the dest_address option to specify a group of addresses for which packets are to be filtered.

The mask must be entered as a complement:

  • Zero-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be identical.

  • One-bits in this parameter mean that the corresponding bits configured for the dest_address parameter must be ignored.


Important

The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore, allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and 0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.


eq dest_port

Specifies a single, specific destination TCP port number to be filtered.

dest_port must be configured to an integer value from 0 to 65535.

gt dest_port

Specifies that all destination TCP port numbers greater than the one specified are to be filtered.

dest_port must be configured to an integer value from 0 to 65535.

lt dest_port

Specifies that all destination TCP port numbers less than the one specified are to be filtered.

dest_port must be configured to an integer value from 0 to 65535.

neq dest_port

Specifies that all destination TCP port numbers not equal to the one specified are to be filtered.

dest_port must be configured to an integer value from 0 to 65535.

Usage Guidelines

Block IP packets when the source and destination are of interest but for only a limited set of ports.


Important

The maximum number of rules that can be configured per ACL varies depending on how the ACL is to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide. Also note that "redirect" rules are ignored for ACLs applied to specific subscribers or all subscribers facilitated by a specific context.


Examples

The following command defines a rule that redirects packets to the next hop host at fe80::c0a8:a04 , the context with the context ID of 23 , and UDP packets coming from any host are matched:
redirect nexthop fe80::c0a8:a04 context 23 udp any  
The following sets the insertion point to before the rule defined above:
before redirect nexthop fe80::c0a8:a04 context 23 udp any  
The following command sets the insertion point after the rule defined above:
after redirect nexthop fe80::c0a8:a04 context 23 udp any  
The following command deletes the first rule defined above:
no redirect nexthop fe80::c0a8:a04 context 23 udp any