•
Use the
no permit icmp {
source mask
| any | host
ip-address
} {
destination mask
| any | host
ip-address
}
command.
Parameters
source
Enter the IP address of the network or host from which the packets were sent.
mask
Enter a network mask in /prefix format (/x) or A.B.C.D. The mask, when specified in
A.B.C.D format, may be either contiguous or noncontiguous.
any
Enter the keyword
any
to match and drop specific Ethernet traffic on the interface.
host
ip-address
Enter the keyword
host
and then enter the IP address to specify a host IP address.
destination
Enter the IP address of the network or host to which the packets are sent.
type
Enter the ICMP packet type. The following types are available:
For IPv4:
echo count
echo-reply count
host-unreachable count
host-unknown count
network-unknown count
net-unreachable count
packet-too-big count
parameter-problem count
port-unreachable count
source-quench count
time-exceeded count
For IPv6:
echo count
echo-reply count
nd-ns count
nd-na count
packet-too-big count
parameter-problem count
time-exceeded count
port-unreachable count
The ICMP packets cannot be filtered using mirroring ACL.
dscp
Enter the keyword
dscp
to deny a packet based on the DSCP value. The range is 0 to
63.
message-type
(OPTIONAL) Enter an ICMP message type, either with the type (and code, if necessary)
numbers or with the name of the message type. The range is 0 to 255 for ICMP type and
0 to 255 for ICMP code.
count
(OPTIONAL) Enter the keyword
count
to count packets the filter processes.
byte
(OPTIONAL) Enter the keyword
byte
to count bytes the filter processes.
log
(OPTIONAL, E-Series only) Enter the keyword
log
to have the information kept in an
ACL log file.
order
(OPTIONAL) Enter the keyword
order
to specify the QoS priority for the ACL entry.
The range is 0 to 254 (where 0 is the highest priority and 254 is the lowest; lower-order
numbers have a higher priority). If you do not use the keyword
order
, the ACLs have the
lowest order by default (255).
monitor
(OPTIONAL) Enter the keyword
monitor
when the rule is describing the traffic that you
want to monitor and the ACL in which you are creating the rule is applied to the
monitored interface.
212
Access Control Lists (ACL)
Содержание S6100
Страница 1: ...Dell Command Line Reference Guide for the S6100 ON System 9 11 2 0P1 ...
Страница 474: ...protocol list ttl0 ttl1 Dell 474 Control Plane Policing CoPP ...
Страница 979: ... show lldp neighbors display the LLDP neighbors Link Layer Discovery Protocol LLDP 979 ...
Страница 1627: ... uplink state group creates an uplink state group and enables the tracking of upstream links Uplink Failure Detection UFD 1627 ...