deny
Configure a filter that drops IP packets meeting the filter criteria.
Syntax
deny {ip |
ip-protocol-number
} {
source mask
| any | host
ip-address
}
{
destination
mask | any | host
ip-address
} [count [byte] | log] [dscp
value
]
[order] [monitor [
session-ID
]] [fragments] [no-drop]
To remove this filter, you have two choices:
•
Use the
no seq
sequence-number
command if you know the filter’s sequence number.
•
Use the
no deny {ip |
ip-protocol-number
} {
source mask
| any | host
ip-address
}
{
destination mask
| any | host
ip-address
}
command.
Parameters
ip
Enter the keyword
ip
to configure a generic IP access list. The keyword
ip
specifies that
the access list denies all IP protocols.
ip-protocol-number
Enter a number from 0 to 255 to deny based on the protocol identified in the IP protocol
header.
source
Enter the IP address of the network or host from which the packets were sent.
mask
Enter a network mask in /prefix format (/x) or A.B.C.D. The mask, when specified in
A.B.C.D format, may be either contiguous or noncontiguous.
any
Enter the keyword
any
to specify that all routes are subject to the filter.
host
ip-address
Enter the keyword
host
then the IP address to specify a host IP address.
destination
Enter the IP address of the network or host to which the packets are sent.
count
(OPTIONAL) Enter the keyword
count
to count packets that the filter processes.
byte
(OPTIONAL) Enter the keyword
byte
to count bytes that the filter processes.
log
(OPTIONAL, E-Series only) Enter the keyword
log
to enter ACL matches in the log.
dscp
(OPTIONAL) Enter the keyword
dcsp
to match to the IP DCSCP values.
order
(OPTIONAL) Enter the keyword
order
to specify the QoS priority for the ACL entry.
The range is from 0 to 254 (where 0 is the highest priority and 254 is the lowest; lower-
order numbers have a higher priority). If you do not use the keyword
order
, the ACLs
have the lowest order by default (255).
monitor
(OPTIONAL) Enter the keyword
monitor
then the session–ID to describe the traffic
that you want to monitor and the ACL in which you are creating the rule is applied to the
monitored interface. The session–ID range is from 0 to 65535. For more information, see
Flow-based Monitoring
in the Port Monitoring section in the
Dell Networking OS
Configuration Guide
.
fragments
Enter the keyword
fragments
to use ACLs to control packet fragments.
no-drop
Enter the keywords
no-drop
to match only the forwarded packets.
Defaults
Not configured.
Command Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
Access Control Lists (ACL)
199