•
icmp
—
Specifies that the rule applies to ICMP traffic only. When you use this keyword, the
icmp-message
argument is available, in addition to the keywords that are available for all valid values of the
protocol
argument.
•
igmp
—
Specifies that the rule applies to IGMP traffic only. When you use this keyword, the
igmp-type
argument is available, in addition to the keywords that are available for all valid values of the
protocol
argument.
•
ip
—
Specifies that the rule applies to all IPv4 traffic.
•
nos
—
Specifies that the rule applies to KA9Q NOS-compatible IP-over-IP tunneling traffic only.
•
ospf
—
Specifies that the rule applies to Open Shortest Path First (OSPF) traffic only.
•
pcp
—
Specifies that the rule applies to payload compression protocol (PCP) traffic only.
•
pim
—
Specifies that the rule applies to protocol-independent multicast (PIM) traffic only.
•
tcp
—
Specifies that the rule applies to TCP traffic only. When you use this keyword, the
flags
and
operator
arguments and the
portgroup
and
established
keywords are available, in addition to the
keywords that are available for all valid values of the
protocol
argument.
•
udp
—
Specifies that the rule applies to UDP traffic only. When you use this keyword, the
operator
argument and the
portgroup
keyword are available, in addition to the keywords that are available for
all valid values of the
protocol
argument.
Source and Destination
You can specify the
source
and
destination
arguments in one of several ways. In each rule, the method you
use to specify one of these arguments does not affect how you specify the other. When you configure a rule,
use the following methods to specify the
source
and
destination
arguments:
•
IP address group object
—
You can use an IPv4 address group object to specify a
source
or
destination
argument. Use the
object-group ip address
command to create and change IPv4 address group objects.
The syntax is as follows:
addrgroup
address-group-name
The following example shows how to use an IPv4 address object group named lab-gateway-svrs to specify
the
destination
argument:
switch(config-acl)#
permit ip any addrgroup lab-gateway-svrs
•
Address and network wildcard
—
You can use an IPv4 address followed by a network wildcard to specify
a host or a network as a source or destination. The syntax is as follows:
IPv4-address network-wildcard
The following example shows how to specify the
source
argument with the IPv4 address and network wildcard
for the 192.168.67.0 subnet:
switch(config-acl)#
permit tcp 192.168.67.0 0.0.0.255 any
•
Address and variable-length subnet mask
—
You can use an IPv4 address followed by a variable-length
subnet mask (VLSM) to specify a host or a network as a source or destination. The syntax is as follows:
IPv4-address/prefix-len
Cisco Nexus 7000 Series Security Command Reference
550
P Commands
permit (IPv4)
Summary of Contents for Nexus 7000 Series
Page 2: ... Cisco Systems Inc All rights reserved ...
Page 20: ...Cisco Nexus 7000 Series Security Command Reference xx Contents ...
Page 62: ...Cisco Nexus 7000 Series Security Command Reference 36 A Commands aaa authentication rejected ...
Page 78: ...Cisco Nexus 7000 Series Security Command Reference 52 A Commands aaa user default role ...
Page 157: ...Cisco Nexus 7000 Series Security Command Reference 131 C Commands crypto ca import ...
Page 172: ...Cisco Nexus 7000 Series Security Command Reference 146 C Commands cts role based sgt map ...
Page 186: ...Cisco Nexus 7000 Series Security Command Reference 160 C Commands cts role based access list ...
Page 256: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 230 D Commands deny IPv4 ...
Page 271: ...protocol Cisco Nexus 7000 Series Security Command Reference 245 D Commands deny IPv6 ...
Page 274: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 248 D Commands deny IPv6 ...
Page 291: ...Cisco Nexus 7000 Series Security Command Reference 265 D Commands description identity policy ...
Page 293: ...Cisco Nexus 7000 Series Security Command Reference 267 D Commands description user role ...
Page 299: ...Cisco Nexus 7000 Series Security Command Reference 273 D Commands device role ...
Page 313: ...Cisco Nexus 7000 Series Security Command Reference 287 E Commands enable Cert DN match ...
Page 340: ...Cisco Nexus 7000 Series Security Command Reference 314 E Commands eq ...
Page 344: ...Cisco Nexus 7000 Series Security Command Reference 318 F Commands feature cts ...
Page 350: ...Cisco Nexus 7000 Series Security Command Reference 324 F Commands feature ldap ...
Page 369: ...G Commands gt page 344 Cisco Nexus 7000 Series Security Command Reference 343 ...
Page 372: ...Cisco Nexus 7000 Series Security Command Reference 346 G Commands gt ...
Page 398: ...Cisco Nexus 7000 Series Security Command Reference 372 I Commands interface policy deny ...
Page 497: ...Cisco Nexus 7000 Series Security Command Reference 471 K Commands key config key ...
Page 504: ...Cisco Nexus 7000 Series Security Command Reference 478 K Commands key string ...
Page 518: ...Cisco Nexus 7000 Series Security Command Reference 492 L Commands It ...
Page 536: ...Cisco Nexus 7000 Series Security Command Reference 510 M Commands monitor session ...
Page 552: ...Cisco Nexus 7000 Series Security Command Reference 526 O Commands other config flag ...
Page 569: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 543 P Commands permit IPv4 ...
Page 584: ...protocol Cisco Nexus 7000 Series Security Command Reference 558 P Commands permit IPv6 ...
Page 587: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 561 P Commands permit IPv6 ...
Page 622: ...Cisco Nexus 7000 Series Security Command Reference 596 P Commands propagate sgt ...
Page 664: ...Cisco Nexus 7000 Series Security Command Reference 638 R Commands rule ...
Page 737: ...Cisco Nexus 7000 Series Security Command Reference 711 Show Commands show arp access lists ...
Page 841: ...Cisco Nexus 7000 Series Security Command Reference 815 Show Commands show ipv6 dhcp ldra ...
Page 992: ...Cisco Nexus 7000 Series Security Command Reference 966 T Commands trustedCert ...
Page 1015: ...Cisco Nexus 7000 Series Security Command Reference 989 V Commands vlan policy deny ...
Page 1017: ...Cisco Nexus 7000 Series Security Command Reference 991 V Commands vrf policy deny ...
Page 1018: ...Cisco Nexus 7000 Series Security Command Reference 992 V Commands vrf policy deny ...