•
Use the
no deny icmp {
source address mask
| any | host
ipv6-
address
} {
destination address
| any | host
ipv6-address
}
command
Parameters
source address
Enter the IPv6 address of the network or host from which the packets
were sent in the x:x:x:x::x format followed by the prefix length in the /x
format. The range is /0 to /128. The :: notation specifies successive
hexadecimal fields of zero.
mask
Enter a network mask in /prefix format (/x).
any
Enter the keyword
any
to specify that all routes are subject to the
filter.
host
ipv6-address
Enter the keyword
host
followed by the IPv6 address of the host in
the x:x:x:x::x format. The :: notation specifies successive hexadecimal
fields of zero.
destination
address
Enter the IPv6 address of the network or host to which the packets
are sent in the x:x:x:x::x format followed by the prefix length in the /x
format. The range is /0 to /128. The :: notation specifies successive
hexadecimal fields of zero.
message-type
On the E-Series only, enter an ICMP message type, either with the
type (and code, if necessary) numbers or with the name of the
message type. The range is 0 to 255 for ICMP type and 0 to 255 for
ICMP code.
count
(OPTIONAL) Enter the keyword
count
to count packets processed
by the filter.
byte
(OPTIONAL) Enter the keyword
byte
to count bytes processed by
the filter.
log
(OPTIONAL) Enter the keyword
log
to have the information kept in an
ACL log file.
monitor
(OPTIONAL) Enter the keyword
monitor
to monitor traffic on the
monitoring interface specified in the flow-based monitoring session
along with the filter operation.
Defaults
Not configured.
Command Modes
ACCESS-LIST
Command History
Version 8.4.2.1
Introduced on the S-Series.
Version 8.2.1.0
Introduced on the E-Series TeraScale.
Version 7.8.1.0
Introduced on the C-Series.
Version 7.4.1.0
Introduced on the E-Series TeraScale Added the
monitor
option.
Usage
Information
The C-Series cannot count both packets and bytes, so when you enter the
count byte
options, only bytes are incremented.
905
Содержание Force10 S4810P
Страница 1: ...FTOS Command Line Reference Guide for the S4810 System FTOS 9 1 0 0 ...
Страница 48: ...48 ...
Страница 62: ...62 ...
Страница 92: ...92 ...
Страница 102: ...102 ...
Страница 202: ...202 ...
Страница 216: ...216 ...
Страница 334: ...334 ...
Страница 564: ...564 ...
Страница 570: ...570 ...
Страница 594: ...594 ...
Страница 632: ...632 ...
Страница 642: ...642 ...
Страница 662: ...662 ...
Страница 670: ...Related Commands clear ip dhcp snooping clears the contents of the DHCP binding table 670 ...
Страница 688: ...688 ...
Страница 702: ...702 ...
Страница 712: ...712 ...
Страница 723: ...Related Commands show gvrp displays the GVRP configuration 723 ...
Страница 724: ...724 ...
Страница 736: ...736 ...
Страница 900: ...900 ...
Страница 934: ...934 ...
Страница 958: ...958 ...
Страница 966: ...966 ...
Страница 1018: ...1018 ...
Страница 1026: ...1026 ...
Страница 1086: ...1086 ...
Страница 1100: ...1100 ...
Страница 1116: ...1116 ...
Страница 1164: ...1164 ...
Страница 1268: ...1268 ...
Страница 1276: ...1276 ...
Страница 1286: ...1286 ...
Страница 1300: ...1300 ...
Страница 1376: ...1376 ...
Страница 1390: ...1390 ...
Страница 1460: ...1460 ...
Страница 1512: ...1512 ...
Страница 1518: ...1518 ...
Страница 1528: ...1528 ...
Страница 1538: ...1538 ...
Страница 1551: ...To display the type of STP guard Portfast BPDU root or loop guard enabled on a port enter the show spanning tree 0 command 1551 ...
Страница 1552: ...1552 ...
Страница 1572: ...1572 ...
Страница 1586: ... uplink state group creates an uplink state group and enables the tracking of upstream links 1586 ...
Страница 1598: ...FTOS config interface vlan 40 FTOS conf if vlan tagged TenGi 8 0 FTOS conf if vlan exit FTOS config 1598 ...
Страница 1612: ...1612 ...