Example: ingress protocol matching access list¶
r1
hostname r1
access-list test4
deny 1 any all any all
permit all any all any all
exit
access-list test6
deny 58 any all any all
permit all any all any all
exit
vrf def v1
rd 1:1
exit
int ser1
vrf for v1
ipv4 addr 1.1.1.1 255.255.255.252
ipv6 addr 1234::1 ffff:ffff::
ipv4 access-group-in test4
ipv6 access-group-in test6
exit
r2
hostname r2
vrf def v1
rd 1:1
exit
int ser1
vrf for v1
ipv4 addr 1.1.1.2 255.255.255.252
ipv6 addr 1234::2 ffff:ffff::
exit
r1 tping 100 5 1.1.1.1 vrf v1
r1 tping 100 5 1234::1 vrf v1
r1 tping 0 5 1.1.1.2 vrf v1
r1 tping 0 5 1234::2 vrf v1
r2 tping -100 5 1.1.1.1 vrf v1 error
r2 tping -100 5 1234::1 vrf v1 error
r1 output show access-list test4
r1 output show access-list test6
output ../binTmp/crypt-acl.html
<html><body bgcolor="#000000" text="#FFFFFF" link="#00FFFF" vlink="#00FFFF" alink="#00FFFF">
here is the ipv4 acl:
here is the ipv6 acl:
- Install ContainerLab as described here
- Fetch crypt-acl01 file
- Launch ContainerLab
crypt-acl01.yml
topology:
containerlab deploy --topo crypt-acl01.yml
crypt-acl01.yml
topology:
containerlab destroy --topo crypt-acl01.yml