Access Control Lists (ACL) |
217
seq
c e s
Assign a sequence number to a deny or permit filter in an IP access list while creating the filter.
Syntax
seq
sequence-number
{
deny
|
permit
} {
source
[
mask
] |
any
|
host ip-address
}} [
count
[
byte
] |
log
] [
dscp
value
] [
order
] [
monitor
]
[fragments]
Parameters
Defaults
Not configured
Command Modes
CONFIGURATION-STANDARD-ACCESS-LIST
Command
History
sequence-number
Enter a number from 0 to 4294967290.
deny
Enter the keyword
deny
to configure a filter to drop packets meeting this
condition.
permit
Enter the keyword
permit
to configure a filter to forward packets meeting this
criteria.
source
Enter a IP address in dotted decimal format of the network from which the
packet was received.
mask
(OPTIONAL) Enter a network mask in /prefix format (/x) or A.B.C.D. The
mask, when specified in A.B.C.D format, may be either contiguous or
non-contiguous.
any
Enter the keyword
any
to specify that all routes are subject to the filter.
host ip-address
Enter the keyword
host
followed by the IP address to specify a host IP
address or hostname.
count
(OPTIONAL) Enter the keyword
count
to count packets processed by the
filter.
byte
(OPTIONAL) Enter the keyword
byte
to count bytes processed by the filter.
log
(OPTIONAL, E-Series only) Enter the keyword
log
to enter ACL matches in
the log.
dscp
(OPTIONAL) Enter the keyword
dcsp
to match to the IP DCSCP values.
order
(OPTIONAL) Enter the keyword
order
to specify the QoS order for the ACL
entry.
Range: 0-254 (where 0 is the highest priority and 254 is the lowest; lower order
numbers have a higher priority)
Default: If the order keyword is not used, the ACLs have the lowest order by
default (255).
monitor
(OPTIONAL) Enter the keyword
monitor
when the rule is describing the
traffic that you want to monitor and the ACL in which you are creating the rule
will be applied to the monitored interface. For details, see the section
“Flow-based Monitoring” in the Port Monitoring chapter of the
FTOS
Configuration Guide
.
fragments
Enter the keyword
fragments
to use ACLs to control packet fragments.
Version 8.3.1.0
Add DSCP value for ACL matching.
Version 8.2.1.0
Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
Version 8.1.1.0
Introduced on E-Series ExaScale
Version 7.6.1.0
Added support for S-Series
Version 7.5.1.0
Added support for C-Series
Summary of Contents for Force10 TeraScale C Series
Page 1: ...FTOS Command Line Reference Guide FTOS 8 4 2 7 E Series TeraScale C Series S Series S50 S25 ...
Page 164: ...164 Control and Monitoring w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 176: ...176 802 1ag w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 188: ...188 802 3ah w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 204: ...204 802 1X w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 294: ...294 Access Control Lists ACL w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 428: ...428 Border Gateway Protocol IPv4 BGPv4 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 456: ...456 Configuration Rollback w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 472: ...472 Dynamic Host Configuration Protocol DHCP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 484: ...484 Far End Failure Detection FEFD w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 682: ...682 IPv4 Routing w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 732: ...732 IPv6 Basics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 896: ...896 Layer 2 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 914: ...914 Link Layer Detection Protocol LLDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 926: ...926 Multicast Listener Discovery MLD w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 952: ...952 Multiple Spanning Tree Protocol MSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 976: ...976 Multicast w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 984: ...984 Neighbor Discovery Protocol NDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1094: ...1094 Policy based Routing PBR w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1130: ...1130 PIM Sparse Mode PIM SM w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1164: ...1164 Private VLAN PVLAN w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1276: ...1276 Rapid Spanning Tree Protocol RSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1342: ...1342 Service Provider Bridging w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1354: ...1354 sFlow w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1428: ...1428 Spanning Tree Protocol STP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1444: ...1444 Time and Network Time Protocol NTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1464: ...1464 VLAN Stacking w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1494: ...1494 Virtual Router Redundancy Protocol VRRP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1534: ...1534 C Series Diagnostics and Debugging w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1574: ...1574 E Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1592: ...1592 S Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1622: ...1622 Index w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1640: ...1640 Command Index w w w d e l l c o m s u p p o r t d e l l c o m ...