10Step Command1. Enter system view. system-view2. Copy an existing IPv4 ACL to create anew IPv4 ACL.acl copy { source-acl-number | name source-acl-name } to{ dest-acl-number | name dest-acl-name }Copying an IPv6 ACLStep Command1. Enter system view. system-view2. Copy an existing IPv6 ACL to generate anew one of the same category.acl ipv6 copy { source-acl6-number | namesource-acl6-name } to { dest-acl6-number | namedest-acl6-name }Configuring packet filtering with ACLsYou can use an ACL to filter incoming IPv4 or IPv6 packets. You can apply one IPv4 ACL, one IPv6 ACL,and one Ethernet frame header ACL at most to filter packets in the inbound direction of an interface.With a basic or advanced ACL, you can log filtering events by specifying the logging keyword in the ACLrules and enabling the counting function. To enable counting for rule matches performed in hardware,configure the hardware-count enable command for the ACL or specify the counting keyword in the ACLrules.You can set the packet filter to periodically send packet filtering logs to the information center asinformational messages. The interval for generating and outputting packet filtering logs is configurable.The log information includes the number of matching packets and the ACL rules used in an interval. Formore information about the information center, see Network Management and MonitoringConfiguration Guide.NOTE:ACLs on VLAN interfaces filter only packets forwarded at Layer 3.Applying an IPv4 or Ethernet frame header ACL for packetfilteringStep Command Remarks1. Enter system view. system-view N/A2. Enter interface view. interface interface-typeinterface-number N/A3. Apply an IPv4 basic, IPv4advanced, or Ethernet frameheader ACL to the interface tofilter packets.packet-filter { acl-number |name acl-name } inboundBy default, no ACL is applied to anyinterface.4. Exit to system view. quit N/A