224
|
Access Control Lists (ACL)
www.dell.com | support.dell.com
You cannot include IP, TCP or UDP (Layer 3) filters in an ACL configured with ARP or Ether-type
(Layer 2) filters. Apply Layer 2 ACLs (ARP and Ether-type) to Layer 2 interfaces only.
deny icmp
e
Configure a filter to drop all or specific ICMP messages.
Syntax
deny
icmp
{
source mask
|
any
|
host
ip-address
} {
destination mask
|
any
|
host
ip-address
}
[
dscp
] [
message-type
] [
count
[
byte
] |
log
] [
order
] [
monitor
] [
fragments
]
To remove this filter, you have two choices:
•
Use the
no
seq
sequence-number
command syntax if you know the filter’s sequence number
or
•
Use the
no
deny
icmp
{
source mask
|
any
|
host
ip-address
} {
destination mask
|
any
|
host
ip-address
} command.
Parameters
Note:
When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
source
Enter the IP address of the network or host from which the packets were sent.
mask
Enter a network mask in /prefix format (/x) or A.B.C.D. The mask, when specified in
A.B.C.D format, may be either contiguous or non-contiguous.
any
Enter the keyword
any
to specify that all routes are subject to the filter.
host ip-address
Enter the keyword
host
followed by the IP address to specify a host IP address.
destination
Enter the IP address of the network or host to which the packets are sent.
dscp
Enter this keyword to deny a packet based on DSCP value.
Range: 0-63
message-type
(OPTIONAL) Enter an ICMP message type, either with the type (and code, if
necessary) numbers or with the name of the message type (ICMP message types are
listed in
).
Range: 0 to 255 for ICMP type; 0 to 255 for ICMP code
count
(OPTIONAL) Enter the keyword
count
to count packets processed by the filter.
byte
(OPTIONAL) Enter the keyword
byte
to count bytes processed by the filter.
log
(OPTIONAL, E-Series only) Enter the keyword
log
to have the information kept in
an ACL log file.
order
(OPTIONAL) Enter the keyword
order
to specify the QoS priority for the ACL
entry.
Range:
0-254 (where 0 is the highest priority and 254 is the lowest; lower order
numbers have a higher priority)
Default:
If the order keyword is not used, the ACLs have the lowest order by default
(255).
monitor
(OPTIONAL) Enter the keyword
monitor
when the rule is describing the traffic that
you want to monitor and the ACL in which you are creating the rule will be applied to
the monitored interface. For details, see the section “Flow-based Monitoring” in the
Port Monitoring chapter of the
FTOS Configuration Guide
.
fragments
Enter the keyword
fragments
to use ACLs to control packet fragments.
Содержание Force10 TeraScale C Series
Страница 1: ...FTOS Command Line Reference Guide FTOS 8 4 2 7 E Series TeraScale C Series S Series S50 S25 ...
Страница 164: ...164 Control and Monitoring w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 176: ...176 802 1ag w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 188: ...188 802 3ah w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 204: ...204 802 1X w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 294: ...294 Access Control Lists ACL w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 428: ...428 Border Gateway Protocol IPv4 BGPv4 w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 456: ...456 Configuration Rollback w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 472: ...472 Dynamic Host Configuration Protocol DHCP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 484: ...484 Far End Failure Detection FEFD w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 682: ...682 IPv4 Routing w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 732: ...732 IPv6 Basics w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 896: ...896 Layer 2 w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 914: ...914 Link Layer Detection Protocol LLDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 926: ...926 Multicast Listener Discovery MLD w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 952: ...952 Multiple Spanning Tree Protocol MSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 976: ...976 Multicast w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 984: ...984 Neighbor Discovery Protocol NDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1094: ...1094 Policy based Routing PBR w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1130: ...1130 PIM Sparse Mode PIM SM w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1164: ...1164 Private VLAN PVLAN w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1276: ...1276 Rapid Spanning Tree Protocol RSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1342: ...1342 Service Provider Bridging w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1354: ...1354 sFlow w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1428: ...1428 Spanning Tree Protocol STP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1444: ...1444 Time and Network Time Protocol NTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1464: ...1464 VLAN Stacking w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1494: ...1494 Virtual Router Redundancy Protocol VRRP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1534: ...1534 C Series Diagnostics and Debugging w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1574: ...1574 E Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1592: ...1592 S Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1622: ...1622 Index w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1640: ...1640 Command Index w w w d e l l c o m s u p p o r t d e l l c o m ...