Command History
Version 8.2.1.0
Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
Version 8.1.1.0
Introduced on the E-Series ExaScale.
Version 7.4.1.0
Added the
monitor
option.
Version 6.5.10
Expanded to include the optional QoS
order
priority for the ACL
entry.
Usage
Information
The
order
option is relevant in the context of the Policy QoS feature only. For more
information, refer to the “Quality of Service” chapter of the
FTOS Configuration Guide
.
NOTE: When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
When you use the
log
option, the CP processor logs details about the packets that match.
Depending on how many packets match the log entry and at what rate, the CP may become
busy as it has to log these packets’ details.
The
monitor
option is relevant in the context of flow-based monitoring only. For more
information, refer to
Port Monitoring
.
You cannot include IP, TCP, or UDP filters in an ACL configured with ARP filters.
permit icmp
Configure a filter to allow all or specific ICMP messages.
E-Series
Syntax
permit icmp {
source mask
| any | host
ip-address
} {
destination
mask
| any | host
ip-address
} [dscp] [
message-type
] [count
[byte] | log] [order] [monitor] [fragments]
To remove this filter, you have two choices:
•
Use the
no seq
sequence-number
command if you know the filter’s sequence
number.
•
Use the
no permit icmp {
source mask
| any | host
ip-address
}
{
destination mask
| any | host
ip-address
}
command.
Parameters
source
Enter the IP address of the network or host from which the packets
were sent.
mask
Enter a network mask in /prefix format (/x) or A.B.C.D. The mask,
when specified in A.B.C.D format, may be either contiguous or
noncontiguous.
any
Enter the keyword
any
to match and drop specific Ethernet traffic on
the interface.
host
ip-address
Enter the keyword
host
and then enter the IP address to specify a
host IP address.
destination
Enter the IP address of the network or host to which the packets are
sent.
268
Содержание Force10 S4810P
Страница 1: ...FTOS Command Line Reference Guide for the S4810 System FTOS 9 1 0 0 ...
Страница 48: ...48 ...
Страница 62: ...62 ...
Страница 92: ...92 ...
Страница 102: ...102 ...
Страница 202: ...202 ...
Страница 216: ...216 ...
Страница 334: ...334 ...
Страница 564: ...564 ...
Страница 570: ...570 ...
Страница 594: ...594 ...
Страница 632: ...632 ...
Страница 642: ...642 ...
Страница 662: ...662 ...
Страница 670: ...Related Commands clear ip dhcp snooping clears the contents of the DHCP binding table 670 ...
Страница 688: ...688 ...
Страница 702: ...702 ...
Страница 712: ...712 ...
Страница 723: ...Related Commands show gvrp displays the GVRP configuration 723 ...
Страница 724: ...724 ...
Страница 736: ...736 ...
Страница 900: ...900 ...
Страница 934: ...934 ...
Страница 958: ...958 ...
Страница 966: ...966 ...
Страница 1018: ...1018 ...
Страница 1026: ...1026 ...
Страница 1086: ...1086 ...
Страница 1100: ...1100 ...
Страница 1116: ...1116 ...
Страница 1164: ...1164 ...
Страница 1268: ...1268 ...
Страница 1276: ...1276 ...
Страница 1286: ...1286 ...
Страница 1300: ...1300 ...
Страница 1376: ...1376 ...
Страница 1390: ...1390 ...
Страница 1460: ...1460 ...
Страница 1512: ...1512 ...
Страница 1518: ...1518 ...
Страница 1528: ...1528 ...
Страница 1538: ...1538 ...
Страница 1551: ...To display the type of STP guard Portfast BPDU root or loop guard enabled on a port enter the show spanning tree 0 command 1551 ...
Страница 1552: ...1552 ...
Страница 1572: ...1572 ...
Страница 1586: ... uplink state group creates an uplink state group and enables the tracking of upstream links 1586 ...
Страница 1598: ...FTOS config interface vlan 40 FTOS conf if vlan tagged TenGi 8 0 FTOS conf if vlan exit FTOS config 1598 ...
Страница 1612: ...1612 ...