Used to redirect subscriber sessions to a charging service based on
the transmission control protocol/user datagram protocol packets in the
downlink (from the Mobile Node) direction.
Privilege
Security Administrator, Administrator
Mode
Exec > Global Configuration > Context Configuration > IPv6
ACL Configuration
configure > context
context_name
> ipv6 access-list
ipv6_acl_name
Entering the above command sequence results in the following prompt:
[context_name]host_name(config-ipv6-acl)#
Syntax
redirect css service svc_name [ log ] downlink { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] }
after redirect css service svc_name [ log ] downlink { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] }
after redirect css service svc_name [ log ] downlink { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] }
no redirect css service svc_name [ log ] downlink { tcp | udp } { { source_address source_wildcard | any | host source_host_address } [ eq source_port | gt source_port | lt source_port | neq source_port | range start_source_port end_source_port ] } { { dest_address dest_wildcard | any | host dest_host_address } [ eq dest_port | gt dest_port | lt dest_port | neq dest_port | range start_dest_port end_dest_port ] }
after
Indicates all rule definitions subsequent to this command are to be
inserted after the command identified by the exact options listed.
This moves the insertion point to be immediately after the rule
definition which matches the exact options specified such that new rule
definitions will be added, in order, after the matching rule definition.
Important
|
If the options specified do not exactly match an existing rule
definition, the insertion point does not change.
|
before
Indicates all rule definitions subsequent to this command are to be
inserted before the command identified by the exact options listed.
This moves the insertion point to be immediately before the rule
definition which matches the exact options specified such that new rule
definitions will be added, in order, before the matching rule definition.
Important
|
If the options specified do not exactly match an existing rule
definition, the insertion point does not change.
|
no
Removes the rule definition which exactly matches the options
specified.
css service
svc_name
The name of the Content Service Steering (CSS) service to which
packets are to be redirected. At the executive mode prompt, use the
show css service all command to display the
names of all configured CSS services.
svc_name must be an alphanumeric string of 1
through 15 characters.
downlink
Apply this rule definition only to packets in the downlink (from the
Mobile Node) direction.
log
Default: packets are not logged.
Indicates all packets which match the redirect are to be logged.
tcp | udp
Specifies the redirect is to be applied to IP-based transmission
control protocol or the user datagram protocol.
source_address
The IP address(es) form which the packet originated.
This option is used to filter all packets from a specific IP address
or a group of IP addresses.
When specifying a group of addresses, the initial address is
configured using this option. The range can then be configured using the
source_wildcard parameter.
source_wildcard
This option is used in conjunction with the
source_address option to specify a group of
addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits
configured for the
source_address parameter must be
identical.
-
One-bits in this parameter mean that the corresponding bits
configured for the
source_address parameter must be ignored.
Important
|
The mask must contain a contiguous set of one-bits from the least
significant bit (LSB).
|
any
Specifies that the rule definition applies to all packets.
host
Specifies that the rule definition applies to a specific host as
determined by its IP address.
source_host_address
The IP address of the source host to filter against expressed in IPv6
colon-separated-hexadecimal notation.
dest_host_address
The IP address of the destination host to filter against expressed in
IPv6 colon-separated-hexadecimal notation.
eq
source_port
Specifies a single, specific source TCP port number to be filtered.
source_port must be configured to an integer
value from 0 to 65535.
gt
source_port
Specifies that all source TCP port numbers greater than the one
specified are to be filtered.
source_port must be configured to an integer
value from 0 to 65535.
lt
source_port
Specifies that all source TCP port numbers less than the one specified
are to be filtered.
source_port must be configured to an integer
value from 0 to 65535.
neq
source_port
Specifies that all source TCP port numbers not equal to the one
specified are to be filtered.
source_port must be configured to an integer
value from 0 to 65535.
range
start_source_port
end_source_port
Specifies that all source TCP ports within a specific range are to be
filtered.
start_source_port is the initial port in the
range and
end_source_port is the final port in the
range.
Both
start_source_port and
end_source_port can be configured to an
integer value from 0 to 65535.
dest_address
The IP address(es) to which the packet is to be sent.
This option is used to filter all packets to a specific IP address or
a group of IP addresses.
When specifying a group of addresses, the initial address is
configured using this parameter. The range can then be configured using the
dest_wildcard parameter.
dest_wildcard
This option is used in conjunction with the
dest_address option to specify a group of
addresses for which packets are to be filtered.
The mask must be entered as a complement:
-
Zero-bits in this parameter mean that the corresponding bits
configured for the
dest_address parameter must be identical.
-
One-bits in this parameter mean that the corresponding bits
configured for the
dest_address parameter must be ignored.
Important
|
The mask must contain a contiguous set of one-bits from the least
significant bit (LSB).
|
eq
dest_port
Specifies a single, specific destination TCP port number to be
filtered.
dest_port must be configured to an integer
value from 0 to 65535.
gt
dest_port
Specifies that all destination TCP port numbers greater than the one
specified are to be filtered.
dest_port must be configured to an integer
value from 0 to 65535.
lt
dest_port
Specifies that all destination TCP port numbers less than the one
specified are to be filtered.
dest_port must be configured to an integer
value from 0 to 65535.
neq
dest_port
Specifies that all destination TCP port numbers not equal to the one
specified are to be filtered.
dest_port must be configured to an integer
value from 0 to 65535.
range
start_dest_port
end_dest_port
Specifies that all destination TCP ports within a specific range are
to be filtered.
start_dest_port is the initial port in the
range and
end_dest_port is the final port in the range.
Both
start_dest_port and
end_dest_port can be configured to an integer
value from 0 to 65535.
Usage Guidelines
Block IP packets when the source and destination are of interest but
for only a limited set of ports.
Important
|
A maximum of 16 rule definitions can be configured per ACL. Also
note that "redirect" rule definitions are ignored for ACLs applied to specific
subscribers or all subscribers facilitated by a specific context.
|
Example
The following command defines a rule definition that redirects packets
to the charging service named
css-svc1 , and UDP packets coming from any
host are matched:
redirect css service css-svc1 downlink udp any
The following sets the insertion point to before the rule definition
above:
before redirect css service css-svc1 downlink udp any
The following command sets the insertion point after the rule
definition above:
after redirect css service css-svc1 downlink udp any
The following deletes the rule definition above:
no redirect css service css-svc1 downlink udp any