You can configure ACL logging only on ACLs that are applied to ingress interfaces; youcannot enable logging for ACLs that are associated with egress interfaces.You can activate flow-based monitoring for a monitoring session by entering the flow-based enable command in the Monitor Session mode. When you enable thiscapability, traffic with particular flows that are traversing through the ingress and egressinterfaces are examined and, appropriate ACLs can be applied in both the ingress andegress direction. Flow-based monitoring conserves bandwidth by monitoring onlyspecified traffic instead all traffic on the interface. This feature is particularly usefulwhen looking for malicious traffic. It is available for Layer 2 and Layer 3 ingress andegress traffic. You may specify traffic using standard or extended access-lists. Thismechanism copies all incoming or outgoing packets on one port and forwards (mirrors)them to another port. The source port is the monitored port (MD) and the destinationport is the monitoring port (MG).ipv6 access-listConfigure an access list based on IPv6 addresses or protocols.C9000 SeriesSyntax ipv6 access-list access-list-nameTo delete an access list, use the no ipv6 access-list access-list-namecommand.Parameters access-list-name Enter the access list name as a string, up to 140 characters.Defaults All access lists contain an implicit “deny any”; that is, if no match occurs, the packet isdropped.Command Modes CONFIGURATIONCONFIGURATION TERMINAL BATCHCommand History This guide is platform-specific. For command information about other platforms, referto the relevant Dell Networking OS Command Line Reference Guide.The following is a list of the Dell Networking OS version history for this command.Version Description9.10(0.0) Introduced the Configuration Terminal Batch mode on C9010.9.9(0.0) Introduced on the C9010.IPv6 Access Control Lists (IPv6 ACLs) 1251