Command Line Reference Guide
• If sequence-number is not configured, the rules with the same order value are
ordered according to their configuration order.
• If sequence-number is configured, the sequence-number is used as a tie breaker
for rules with the same order.
When you use the log option, the CP processor logs details about the packets that match.
Depending on how many packets match the log entry and at what rate, the CP may become
busy as it has to log these packets’ details.
NOTE: When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
Related
Commands
deny – configures a filter to drop packets.
permit – configures a filter to forward packets.
Extended IP ACL Commands
When an ACL is created without any rule and then applied to an interface, ACL behavior reflects an implicit permit.
The following commands configure extended IP ACLs, which in addition to the IP address, also examine the packet’s
protocol type.
NOTE: Also refer to the Commands Common to all ACL Types and Common IP ACL Commands sections.
deny
Configure a filter that drops IP packets meeting the filter criteria.
S5000
Syntax
deny {ip | ip-protocol-number} {source mask | any | host ip-
address} {destination mask | any | host ip-address} [count
[byte]] [dscp value] [order] [monitor] [fragments]
To remove this filter, you have two choices:
• Use the no seq sequence-number command if you know the filter’s sequence
number.
• Use the no deny {ip | ip-protocol-number} {source mask | any
| host ip-address} {destination mask | any | host ip-
address} command.
Parameters
ip Enter the keyword ip to configure a generic IP access list. The
keyword
ip specifies that the access list denies all IP protocols.
ip-protocol-
number
Enter a number from 0 to 255 to deny based on the protocol identified
in the IP protocol header.
190