ns-acl6¶
The following operations can be performed on "ns-acl6":
add| rm| set| unset| enable| disable| stat| rename| show|
add ns acl6¶
Adds an ACL6 rule to the Citrix ADC. To commit this operation, you must apply the ACL6s. ACL6 rules filter data packets on the basis of various parameters, such as IP address, source port, action, and protocol.
Synopsis¶
add ns acl6 <acl6name> <acl6action> [-td <positive_integer>] [-srcIPv6 [<operator>] <srcIPv6Val>] [-srcPort [<operator>] <srcPortVal>] [-destIPv6 [<operator>] <destIPv6Val>] [-destPort [<operator>] <destPortVal>] (-TTL <positive_integer> | -stateful ( YES | NO )) [-srcMac <mac_addr> [-srcMacMask <string>]] [(-protocol <protocol> [-established]) | -protocolNumber <positive_integer>] [-vlan <positive_integer> | -vxlan <positive_integer>] [-interface <interface_name>] [-icmpType <positive_integer> [-icmpCode <positive_integer>]] [-priority <positive_integer>] [-state ( ENABLED | DISABLED )] [-type ( CLASSIC | DFD ) [-dfdhash <dfdhash>] [-dfdprefix <positive_integer>]] [-logstate ( ENABLED | DISABLED ) [-ratelimit <positive_integer>]]
Arguments¶
acl6name
Name for the ACL6 rule. Must begin with an ASCII alphabetic or underscore (_) character, and must contain only ASCII alphanumeric, underscore, hash (#), period (.), space, colon (:), at (@), equals (=), and hyphen (-) characters.
acl6action
Action to perform on the incoming IPv6 packets that match the ACL6 rule. Available settings function as follows: * ALLOW - The Citrix ADC processes the packet. * BRIDGE - The Citrix ADC bridges the packet to the destination without processing it. * DENY - The Citrix ADC drops the packet.
Possible values: BRIDGE, DENY, ALLOW
td
Integer value that uniquely identifies the traffic domain in which you want to configure the entity. If you do not specify an ID, the entity becomes part of the default traffic domain, which has an ID of 0. Minimum value: 0 Maximum value: 4094
srcIPv6
IP address or range of IP addresses to match against the source IP address of an incoming IPv6 packet. In the command line interface, separate the range with a hyphen.
operator
Either the equals (=) or does not equal (!=) logical operator.
Possible values: =, !=, EQ, NEQ
srcIPv6Val
Source IPv6 address (range).
srcPort
Port number or range of port numbers to match against the source port number of an incoming IPv6 packet. In the command line interface, separate the range with a hyphen. For example: 40-90.
Note: The destination port can be specified only for TCP and UDP protocols.
operator
Either the equals (=) or does not equal (!=) logical operator.
Possible values: =, !=, EQ, NEQ
srcPortVal
Source port (range). Maximum value: 65535
destIPv6
IP address or range of IP addresses to match against the destination IP address of an incoming IPv6 packet. In the command line interface, separate the range with a hyphen.
operator
Either the equals (=) or does not equal (!=) logical operator.
Possible values: =, !=, EQ, NEQ
destIPv6Val
Destination IPv6 address (range).
destPort
Port number or range of port numbers to match against the destination port number of an incoming IPv6 packet. In the command line interface, separate the range with a hyphen. For example: 40-90.
Note: The destination port can be specified only for TCP and UDP protocols.
operator
Either the equals (=) or does not equal (!=) logical operator.
Possible values: =, !=, EQ, NEQ
destPortVal
Destination port (range). Maximum value: 65535
TTL
Time to expire this ACL6 (in seconds). Minimum value: 1 Maximum value: 2147483647
srcMac
MAC address to match against the source MAC address of an incoming IPv6 packet.
srcMacMask
Used to define range of Source MAC address. It takes string of 0 and 1, 0s are for exact match and 1s for wildcard. For matching first 3 bytes of MAC address, srcMacMask value "000000111111". Default value: "000000000000"
protocol
Protocol, identified by protocol name, to match against the protocol of an incoming IPv6 packet.
Possible values: ICMPV6, TCP, UDP, ICMP, IGMP, EGP, IGP, ARGUS, RDP, RSVP, EIGRP, L2TP, ISIS, GGP, IPoverIP, ST, CBT, BBN-RCC-M, NVP-II, PUP, EMCON, XNET, CHAOS, MUX, DCN-MEAS, HMP, PRM, XNS-IDP, TRUNK-1, TRUNK-2, LEAF-1, LEAF-2, IRTP, ISO-TP4, NETBLT, MFE-NSP, MERIT-INP, SEP, 3PC, IDPR, XTP, DDP, IDPR-CMTP, TP++, IL, IPv6, SDRP, IPv6-Route, IPv6-Frag, IDRP, GRE, MHRP, BNA, ESP, AH, I-NLSP, SWIPE, NARP, MOBILE, TLSP, SKIP, IPv6-NoNx, IPv6-Opts, Any-Host-Internal-Protocol, CFTP, Any-Local-Network, SAT-EXPAK, KRYPTOLAN, RVD, IPPC, Any-Distributed-File-System, TFTP, VISA, IPCV, CPNX, CPHB, WSN, PVP, BR-SAT-MO, SUN-ND, WB-MON, WB-EXPAK, ISO-IP, VMTP, SECURE-VM, VINES, TTP, NSFNET-IG, DGP, TCF, OSPFIGP, Sprite-RP, LARP, MTP, AX.25, IPIP, MICP, SCC-SP, ETHERIP, Any-Private-Encryption-Scheme, GMTP, IFMP, PNNI, PIM, ARIS, SCPS, QNX, A/N, IPComp, SNP, Compaq-Pe, IPX-in-IP, VRRP, PGM, Any-0-Hop-Protocol, ENCAP, DDX, IATP, STP, SRP, UTI, SMP, SM, PTP, FIRE, CRTP, CRUDP, SSCOPMCE, IPLT, SPS, PIPE, SCTP, FC, RSVP-E2E-IGNORE, Mobility-Header, UDPLite
protocolNumber
Protocol, identified by protocol number, to match against the protocol of an incoming IPv6 packet. Minimum value: 1 Maximum value: 255
vlan
ID of the VLAN. The Citrix ADC applies the ACL6 rule only to the incoming packets on the specified VLAN. If you do not specify a VLAN ID, the appliance applies the ACL6 rule to the incoming packets on all VLANs. Minimum value: 1 Maximum value: 4094
vxlan
ID of the VXLAN. The Citrix ADC applies the ACL6 rule only to the incoming packets on the specified VXLAN. If you do not specify a VXLAN ID, the appliance applies the ACL6 rule to the incoming packets on all VXLANs. Minimum value: 1 Maximum value: 16777215
interface
ID of an interface. The Citrix ADC applies the ACL6 rule only to the incoming packets from the specified interface. If you do not specify any value, the appliance applies the ACL6 rule to the incoming packets from all interfaces.
established
Allow only incoming TCP packets that have the ACK or RST bit set if the action set for the ACL6 rule is ALLOW and these packets match the other conditions in the ACL6 rule.
icmpType
ICMP Message type to match against the message type of an incoming IPv6 ICMP packet. For example, to block DESTINATION UNREACHABLE messages, you must specify 3 as the ICMP type.
Note: This parameter can be specified only for the ICMP protocol. Minimum value: 0 Maximum value: 65536
icmpCode
Code of a particular ICMP message type to match against the ICMP code of an incoming IPv6 ICMP packet. For example, to block DESTINATION HOST UNREACHABLE messages, specify 3 as the ICMP type and 1 as the ICMP code.
If you set this parameter, you must set the ICMP Type parameter. Minimum value: 0 Maximum value: 65536
priority
Priority for the ACL6 rule, which determines the order in which it is evaluated relative to the other ACL6 rules. If you do not specify priorities while creating ACL6 rules, the ACL6 rules are evaluated in the order in which they are created. Minimum value: 1 Maximum value: 81920
state
State of the ACL6.
Possible values: ENABLED, DISABLED Default value: ENABLED
type
Type of the acl6 ,default will be CLASSIC. Available options as follows: * CLASSIC - specifies the regular extended acls. * DFD - cluster specific acls,specifies hashmethod for steering of the packet in cluster .
Possible values: CLASSIC, DFD Default value: CLASSIC
dfdhash
Specifies the type of hashmethod to be applied, to steer the packet to the FP of the packet.
Possible values: SIP-SPORT-DIP-DPORT, SIP, DIP, SIP-DIP, SIP-SPORT, DIP-DPORT
dfdprefix
hashprefix to be applied to SIP/DIP to generate rsshash FP.eg 128 => hash calculated on the complete IP Default value: 128 Minimum value: 1 Maximum value: 128
stateful
If stateful option is enabled, transparent sessions are created for the traffic hitting this ACL6 and not hitting any other features like LB, INAT etc.
Possible values: YES, NO Default value: NO
logstate
Enable or disable logging of events related to the ACL6 rule. The log messages are stored in the configured syslog or auditlog server.
Possible values: ENABLED, DISABLED Default value: DISABLED
ratelimit
Maximum number of log messages to be generated per second. If you set this parameter, you must enable the Log State parameter. Default value: 100 Minimum value: 1 Maximum value: 10000
Example¶
add ns acl6 rule1 DENY -srcport 45-1024 -destIPv6 2001::45 -protocol TCP
Related Commands¶
rm ns acl6¶
Removes an ACL6 rule from the Citrix ADC. To commit this operation, you must apply the ACL6s.
Synopsis¶
rm ns acl6 <acl6name> ...
Arguments¶
acl6name
Name of the ACL6 rule that you want to remove.
Example¶
rm ns acl6 rule1
Related Commands¶
set ns acl6¶
Modifies the parameters of an ACL6 rule. To commit this operation, you must apply the ACL6s.
Synopsis¶
set ns acl6 <acl6name> [-aclaction <aclaction>] [-srcIPv6 [<operator>] <srcIPv6Val>] [-srcPort [<operator>] <srcPortVal>] [-destIPv6 [<operator>] <destIPv6Val>] [-destPort [<operator>] <destPortVal>] [-srcMac <mac_addr> [-srcMacMask <string>]] [-protocol <protocol> | -protocolNumber <positive_integer>] [-icmpType <positive_integer> [-icmpCode <positive_integer>]] [-vlan <positive_integer> | -vxlan <positive_integer>] [-interface <interface_name>] [-priority <positive_integer>] [-logstate ( ENABLED | DISABLED )] [-ratelimit <positive_integer>] [-established] [-dfdhash <dfdhash>] [-dfdprefix <positive_integer>] [-stateful ( YES | NO )]
Arguments¶
acl6name
Name of the ACL6 rule whose parameters you want to modify.
aclaction
Action associated with the ACL6.
Possible values: BRIDGE, DENY, ALLOW
srcIPv6
IP address or range of IP addresses to match against the source IP address of an incoming IPv6 packet. In the command line interface, separate the range with a hyphen.
operator
Either the equals (=) or does not equal (!=) logical operator.
Possible values: =, !=, EQ, NEQ
srcIPv6Val
Source IPv6 address (range).
srcPort
Source Port (range).
operator
Either the equals (=) or does not equal (!=) logical operator.
Possible values: =, !=, EQ, NEQ
srcPortVal
Source port (range). Maximum value: 65535
destIPv6
IP address or range of IP addresses to match against the destination IP address of an incoming IPv6 packet. In the command line interface, separate the range with a hyphen.
operator
Either the equals (=) or does not equal (!=) logical operator.
Possible values: =, !=, EQ, NEQ
destIPv6Val
Destination IPv6 address (range).
destPort
Destination Port (range).
operator
Either the equals (=) or does not equal (!=) logical operator.
Possible values: =, !=, EQ, NEQ
destPortVal
Destination port (range). Maximum value: 65535
srcMac
MAC address to match against the source MAC address of an incoming IPv6 packet.
srcMacMask
Used to define range of Source MAC address. It takes string of 0 and 1, 0s are for exact match and 1s for wildcard. For matching first 3 bytes of MAC address, srcMacMask value "000000111111". Default value: "000000000000"
protocol
Protocol, identified by protocol name, to match against the protocol of an incoming IPv6 packet.
Possible values: ICMPV6, TCP, UDP, ICMP, IGMP, EGP, IGP, ARGUS, RDP, RSVP, EIGRP, L2TP, ISIS, GGP, IPoverIP, ST, CBT, BBN-RCC-M, NVP-II, PUP, EMCON, XNET, CHAOS, MUX, DCN-MEAS, HMP, PRM, XNS-IDP, TRUNK-1, TRUNK-2, LEAF-1, LEAF-2, IRTP, ISO-TP4, NETBLT, MFE-NSP, MERIT-INP, SEP, 3PC, IDPR, XTP, DDP, IDPR-CMTP, TP++, IL, IPv6, SDRP, IPv6-Route, IPv6-Frag, IDRP, GRE, MHRP, BNA, ESP, AH, I-NLSP, SWIPE, NARP, MOBILE, TLSP, SKIP, IPv6-NoNx, IPv6-Opts, Any-Host-Internal-Protocol, CFTP, Any-Local-Network, SAT-EXPAK, KRYPTOLAN, RVD, IPPC, Any-Distributed-File-System, TFTP, VISA, IPCV, CPNX, CPHB, WSN, PVP, BR-SAT-MO, SUN-ND, WB-MON, WB-EXPAK, ISO-IP, VMTP, SECURE-VM, VINES, TTP, NSFNET-IG, DGP, TCF, OSPFIGP, Sprite-RP, LARP, MTP, AX.25, IPIP, MICP, SCC-SP, ETHERIP, Any-Private-Encryption-Scheme, GMTP, IFMP, PNNI, PIM, ARIS, SCPS, QNX, A/N, IPComp, SNP, Compaq-Pe, IPX-in-IP, VRRP, PGM, Any-0-Hop-Protocol, ENCAP, DDX, IATP, STP, SRP, UTI, SMP, SM, PTP, FIRE, CRTP, CRUDP, SSCOPMCE, IPLT, SPS, PIPE, SCTP, FC, RSVP-E2E-IGNORE, Mobility-Header, UDPLite
protocolNumber
Protocol, identified by protocol number, to match against the protocol of an incoming IPv6 packet. Minimum value: 1 Maximum value: 255
icmpType
ICMP Message type to match against the message type of an incoming IPv6 ICMP packet. For example, to block DESTINATION UNREACHABLE messages, you must specify 3 as the ICMP type.
Note: This parameter can be specified only for the ICMP protocol. Minimum value: 0 Maximum value: 65536
icmpCode
Code of a particular ICMP message type to match against the ICMP code of an incoming IPv6 ICMP packet. For example, to block DESTINATION HOST UNREACHABLE messages, specify 3 as the ICMP type and 1 as the ICMP code.
If you set this parameter, you must set the ICMP Type parameter. Minimum value: 0 Maximum value: 65536
vlan
ID of the VLAN. The Citrix ADC applies the ACL6 rule only to the incoming packets on the specified VLAN. If you do not specify a VLAN ID, the appliance applies the ACL6 rule to the incoming packets on all VLANs. Minimum value: 1 Maximum value: 4094
vxlan
ID of the VXLAN. The Citrix ADC applies the ACL6 rule only to the incoming packets on the specified VXLAN. If you do not specify a VXLAN ID, the appliance applies the ACL6 rule to the incoming packets on all VXLANs. Minimum value: 1 Maximum value: 16777215
interface
ID of an interface. The Citrix ADC applies the ACL6 rule only to the incoming packets from the specified interface. If you do not specify any value, the appliance applies the ACL6 rule to the incoming packets from all interfaces.
priority
Priority for the ACL6 rule, which determines the order in which it is evaluated relative to the other ACL6 rules. If you do not specify priorities while creating ACL6 rules, the ACL6 rules are evaluated in the order in which they are created. Minimum value: 1 Maximum value: 81920
logstate
Enable or disable logging of events related to the ACL6 rule. The log messages are stored in the configured syslog or auditlog server.
Possible values: ENABLED, DISABLED Default value: DISABLED
ratelimit
Maximum number of log messages to be generated per second. If you set this parameter, you must enable the Log State parameter. Default value: 100 Minimum value: 1 Maximum value: 10000
established
Allow only incoming TCP packets that have the ACK or RST bit set if the action set for the ACL6 rule is ALLOW and these packets match the other conditions in the ACL6 rule.
dfdhash
Specifies the type of hashmethod to be applied, to steer the packet to the FP of the packet.
Possible values: SIP-SPORT-DIP-DPORT, SIP, DIP, SIP-DIP, SIP-SPORT, DIP-DPORT
dfdprefix
hashprefix to be applied to SIP/DIP to generate rsshash FP.eg 128 => hash calculated on the complete IP Default value: 128 Minimum value: 1 Maximum value: 128
stateful
If stateful option is enabled, transparent sessions are created for the traffic hitting this ACL6 and not hitting any other features like LB, INAT etc.
Possible values: YES, NO Default value: NO
Example¶
set ns acl6 rule1 -srcPort 50
Related Commands¶
unset ns acl6¶
Resets the attributes of the specified ACL6 rule. To commit this operation, you must apply the ACL6s.Attributes for which a default value is available revert to their default values. Refer to the set ns acl6 command for descriptions of the parameters..Refer to the set ns acl6 command for meanings of the arguments.
Synopsis¶
unset ns acl6 <acl6name> [-srcIPv6] [-srcPort] [-destIPv6] [-destPort] [-srcMac] [-srcMacMask] [-protocol] [-icmpType] [-icmpCode] [-vlan] [-vxlan] [-interface] [-logstate] [-ratelimit] [-established] [-stateful] [-dfdhash] [-dfdprefix]
Example¶
unset ns acl6 rule1 -srcPort
Related Commands¶
enable ns acl6¶
Enables an ACL6 rule. To commit this operation, you must apply the ACL6s.After you apply the ACL6 rules, the Citrix ADC compares incoming IPv6 packets to the enabled ACL6 rules.
Synopsis¶
enable ns acl6 <acl6name> ...
Arguments¶
acl6name
Name of ACL6 rule that you want to enable.
Example¶
enable ns acl6 rule1
Related Commands¶
disable ns acl6¶
Disables an ACL6 rule. To commit this operation, you must apply the ACL6s.After you apply the ACL6 rules, the Citrix ADC does not compare incoming IPv6 packets to the disabled ACL6 rules.
Synopsis¶
disable ns acl6 <acl6name> ...
Arguments¶
acl6name
Name of ACL6 rule that you want to disable.
Example¶
disable ns acl6 rule1
Related Commands¶
stat ns acl6¶
Displays statistics related to the ACL6 rules. To display statistics of all the ACL6 rules, run the command without any parameters. To display statistics of a particular ACL6 rule, specify the name of the ACL6 rule.
Synopsis¶
stat ns acl6 [<acl6name>] [-detail] [-fullValues] [-ntimes <positive_integer>] [-logFile <input_filename>] [-clearstats ( basic | full )]
Arguments¶
acl6name
Name of the ACL6 rule whose statistics you want the Citrix ADC to display.
detail
Specifies detailed output (including more statistics). The output can be quite voluminous. Without this argument, the output will show only a summary.
fullValues
Specifies that numbers and strings should be displayed in their full form. Without this option, long strings are shortened and large numbers are abbreviated
ntimes
The number of times, in intervals of seven seconds, the statistics should be displayed. Default value: 1 Minimum value: 0
logFile
The name of the log file to be used as input.
clearstats
Clear the statsistics / counters
Possible values: basic, full
Output¶
count
devno
stateflag
Counters¶
Bridge ACL6 hits (ACL6Bdg)
Packets matching a bridge IPv6 ACL, which is in transparent mode and bypasses service processing.
Deny ACL6 hits (ACL6Deny)
Packets dropped because they match IPv6 ACLs with processing mode set to DENY.
Allow ACL6 hits (ACL6Allow)
Packets matching IPv6 ACLs with processing mode set to ALLOW. Citrix ADC processes these packets.
NAT ACL6 hits (ACL6NAT)
Packets matching a NAT ACL6, resulting in a NAT session.
ACL6 hits (ACL6Hits)
Packets matching an IPv6 ACL.
ACL6 misses (ACL6Miss)
Packets not matching any IPv6 ACL.
NAT64 ACL6 hits (ACL6NAT64)
Packets matching a NAT64 ACL6, resulting in a NAT64 translation.
ACL6 Count (ACL6Count)
Total number of ACL6 rules configured.
DFD ACL6 Count (dfdACL6Count)
Total number of DFD ACL6 rules configured.
DFD ACL6 hits (dfdACL6Hits)
Packets matching an dfd ACL6.
DFD ACL6 misses (dfdACL6Miss)
Packets not matching any DFD ACL6.
Hits for this ACL6 (Hits)
Number of times the acl6 was hit
Example¶
stat acl6
Related Commands¶
rename ns acl6¶
Renames an ACL6 rule. To commit this operation, you must apply the ACL6s.
Synopsis¶
rename ns acl6 <acl6name> <newName>
Arguments¶
acl6name
Name of the ACL6 rule that you want to rename.
newName
New name for the ACL6 rule. Must begin with an ASCII alphabetic or underscore (_) character, and must contain only ASCII alphanumeric, underscore, hash (#), period (.), space, colon (:), at (@), equals (=), and hyphen (-) characters.
Example¶
rename acl6 rule rule-new
show ns acl6¶
Displays settings related to the ACL6 rules. To display settings of all the ACL6 rules, run the command without any parameters. To display settings of a particular ACL6 rule, specify the name of the ACL6 rule.
Synopsis¶
show ns acl6 [<acl6name>] [-type ( CLASSIC | DFD )]
Arguments¶
acl6name
Name of the ACL6 rule whose details you want the Citrix ADC to display.
type
default will display both CLASSIC and DFD
Possible values: CLASSIC, DFD
Output¶
acl6action
Action to perform on the incoming IPv6 packets that match the ACL6 rule. Available settings function as follows: * ALLOW - The Citrix ADC processes the packet. * BRIDGE - The Citrix ADC bridges the packet to the destination without processing it. * DENY - The Citrix ADC drops the packet.
srcMac
MAC address to match against the source MAC address of an incoming IPv6 packet.
srcMacMask
Used to define range of Source MAC address. It takes string of 0 and 1, 0s are for exact match and 1s for wildcard. For matching first 3 bytes of MAC address, srcMacMask value "000000111111".
stateflag
ACL6 state flag.
protocol
Protocol number in IPv6 header or name.
protocolNumber
Protocol number in IPv6 header or name.
srcPortVal
Source port (range).
operator
Either the equals (=) or does not equal (!=) logical operator.
destPortVal
Destination port (range).
operator
Either the equals (=) or does not equal (!=) logical operator.
srcIPv6Val
Source IPv6 address (range).
operator
Either the equals (=) or does not equal (!=) logical operator.
destIPv6Val
Destination IPv6 address (range).
operator
Either the equals (=) or does not equal (!=) logical operator.
vlan
ID of the VLAN. The Citrix ADC applies the ACL6 rule only to the incoming packets on the specified VLAN. If you do not specify a VLAN ID, the appliance applies the ACL6 rule to the incoming packets on all VLANs.
vxlan
ID of the VXLAN. The Citrix ADC applies the ACL6 rule only to the incoming packets on the specified VXLAN. If you do not specify a VXLAN ID, the appliance applies the ACL6 rule to the incoming packets on all VXLANs.
state
State of the ACL6.
kernelstate
Commit status of the ACL6.
TTL
Time left to expire ACL6 (in seconds).
icmpType
ICMP Message type to match against the message type of an incoming IPv6 ICMP packet. For example, to block DESTINATION UNREACHABLE messages, you must specify 3 as the ICMP type.
Note: This parameter can be specified only for the ICMP protocol.
icmpCode
Code of a particular ICMP message type to match against the ICMP code of an incoming IPv6 ICMP packet. For example, to block DESTINATION HOST UNREACHABLE messages, specify 3 as the ICMP type and 1 as the ICMP code.
If you set this parameter, you must set the ICMP Type parameter.
interface
ID of an interface. The Citrix ADC applies the ACL6 rule only to the incoming packets from the specified interface. If you do not specify any value, the appliance applies the ACL6 rule to the incoming packets from all interfaces.
hits
Number of hits of this ACL6.
established
This flag indicates that the ACL6 should be used for TCP response traffic only.
priority
Priority for the ACL6 rule, which determines the order in which it is evaluated relative to the other ACL6 rules. If you do not specify priorities while creating ACL6 rules, the ACL6 rules are evaluated in the order in which they are created.
logstate
Enable or disable logging of events related to the ACL6 rule. The log messages are stored in the configured syslog or auditlog server.
ratelimit
Packet rate limit for acl logging
time
Time when this acl is applied.
td
Integer value that uniquely identifies the traffic domain in which you want to configure the entity. If you do not specify an ID, the entity becomes part of the default traffic domain, which has an ID of 0.
aclassociate
ACL6 linked
dfdhash
Specifies the type of hashmethod to be applied, to steer the packet to the FP of the packet.
dfdprefix
hashprefix to be applied to SIP/DIP to generate rsshash FP.eg 128 => hash calculated on the complete IP
stateful
If stateful option is enabled, transparent sessions are created for the traffic hitting this ACL6 and not hitting any other features like LB, INAT etc.
devno
count
Example¶
show ns acl6 rule1 1) Name: r1 Action: DENY srcIPv6 = 2001::1 destIPv6 srcMac: srcMacMask: Protocol: Vlan: Interface: Active Status: ENABLED Applied Status: NOTAPPLIED Priority: 10 Hits: 0 TTL: