14[DeviceA-acl-basic-2009] rule permit source 192.168.1.2 0 time-range study logging[DeviceA-acl-basic-2009] rule deny source any time-range study[DeviceA-acl-basic-2009] quit# Enable the device to generate and output IPv4 packet filtering logs at 10-minute intervals.[DeviceA] acl logging frequence 10# Configure the device to output informational log messages to the console.[DeviceA] info-center source default channel 0 log level informational# Apply IPv4 ACL 2009 to filter incoming packets on GigabitEthernet 1/0/1.[DeviceA] interface gigabitethernet 1/0/1[DeviceA-GigabitEthernet1/0/1] packet-filter 2009 inbound[DeviceA-GigabitEthernet1/0/1] quitIPv6 packet filtering configuration exampleNetwork requirementsAs shown in Figure 3, apply an IPv6 ACL to the incoming traffic of GigabitEthernet 1/0/1 on Device Aso that every day from 08:00 to 18:00 the interface allows only packets from Host A to pass through.Configure Device A to output IPv4 packet filtering logs to the console at 10-minute intervals.Figure 3 Network diagramConfiguration procedure# Create a time range from 08:00 to 18:00 every day. system-view[DeviceA] time-range study 8:0 to 18:0 daily# Create IPv6 ACL 2009, and configure two rules for the ACL. One permits packets sourced from HostA and the other denies packets sourced from any other host during the time range study. Enable loggingfor the permit rule.[DeviceA] acl ipv6 number 2009[DeviceA-acl6-basic-2009] rule permit source 1001::2 128 time-range study logging[DeviceA-acl6-basic-2009] rule deny source any time-range study[DeviceA-acl6-basic-2009] quit# Configure the device to collect and output IPv6 packet filtering logs at 10-minute intervals.[DeviceA] acl ipv6 logging frequence 10# Configure the device to output informational log messages to the console.