1-16To do... Use the command… RemarksDisplay configuration and matchstatistics for one or all IPv6 ACLsdisplay acl ipv6 { acl6-number | all |name acl6-name } Available in any viewDisplay the usage of ACLresources display acl resource [ slot slot-number ] Available in any viewDisplay the configuration andstatus of one or all time rangesdisplay time-range { time-range-name |all } Available in any viewClear statistics on one or all IPv4ACLsreset acl counter { acl-number | all |name acl-name } Available in user viewClear statistics on one or all IPv6basic and advanced ACLsreset acl ipv6 counter { acl6-number | all| name acl6-name } Available in user viewACL Configuration ExamplesIPv4 ACL Application Configuration ExampleNetwork requirementsAs shown in Figure 1-1, apply an ACL to the inbound direction of interface GigabitEthernet 1/0/1 onDevice A so that everyday from 8:00 to 18:00, the interface allows only packets sourced from Host A topass. Configure Device A to output IPv4 packet filtering logs to the console at an interval of 10 minutes.Figure 1-1 Network diagram for applying an IPv4 ACL to an interface for packet filteringConfiguration procedure# Create a time range from 08:00 to 18:00 everyday. system-view[DeviceA] time-range study 8:00 to 18:00 daily# Create IPv4 ACL 2009, and configure two rules in the ACL. One permits packets sourced from HostA at 192.168.1.2 and the other denies packets sourced from any other host during the time rangestudy. Enable logging for both rules.[DeviceA] acl number 2009[DeviceA-acl-basic-2009] rule permit source 192.168.1.2 0 time-range study logging[DeviceA-acl-basic-2009] rule deny source any time-range study logging[DeviceA-acl-basic-2009] quit# Apply IPv4 ACL 2009 to filter incoming packets on GigabitEthernet 1/0/1.