CLI Guide
permit (for Extended IP ACLs)
To pass IP packets meeting the filter criteria, configure a filter.
Syntax
permit {source mask | any | host ip-address} {destination mask
| any | host ip-address} [count [bytes]] [dscp value] [order]
[fragments] [log [interval minutes] [threshold-in-msgs [count]]
[monitor]
To remove this filter, you have two choices:
• Use the no seq sequence-number command if you know the filter’s
sequence number.
• Use the no deny {source mask | any | host ip-address}
{destination mask | any | host ip-address} command.
Parameters
source Enter the IP address in dotted decimal format of the
network from which the packet was sent.
mask (OPTIONAL) Enter a network mask in /prefix format (/x) or
A.B.C.D. The mask, when specified in A.B.C.D format, may
be either contiguous or non-contiguous.
any Enter the keyword any to specify that all routes are subject
to the filter.
host ip-address Enter the keyword host then the IP address to specify a
host IP address or hostname.
count (OPTIONAL) Enter the keyword count to count packets
processed by the filter.
bytes (OPTIONAL) Enter the keyword bytes to count bytes
processed by the filter.
dscp (OPTIONAL) Enter the keyword dcsp to match to the IP
DCSCP values.
order (OPTIONAL) Enter the keyword order to specify the QoS
priority for the ACL entry. The range is from 0 to 254 (where
0 is the highest priority and 254 is the lowest; lower-order
numbers have a higher priority). If you do not use the
keyword order, the ACLs have the lowest order by default
(255).
fragments Enter the keyword fragments to use ACLs to control
packet fragments.
log (OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in msgs
count
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of
ACL logs that can be generated, exceeding which the
190
Access Control Lists (ACL)