This applies ACL 100 inbound on your outside interface, where ACL 100 still allows everything through. You can then just do:
> show access-list 100
to see the counters on the first two lines, this'll tell you how many packets you're seeing.
Of course, it would be smarter to actually deny the first two lines in the ACL rather than permit them as this'll protect you somewhat, and you'll still see the counters increment.
If you want to see exactly where the packets are coming from, you can add the log keyword to the end of the first two ACL lines, then the router will spew out a console message showing you the source and destination every time it sees a packet.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...