Command Line Reference Guide

Use the no deny {ip | ip-protocol-number} {source mask | any
| host ip-address} {destination mask | any | host ip-
address} command.
Parameters
ip Enter the keyword ip to configure a generic IP access list. The
keyword ip specifies that the access list will permit all IP protocols.
ip-protocol-
number
Enter a number from 0 to 255 to permit based on the protocol
identified in the IP protocol header. The range is 0 to 128.
source
Enter the IP address in dotted decimal format of the network from
which the packet was sent.
mask
(OPTIONAL) Enter a network mask in /prefix format (/x) or A.B.C.D.
The mask, when specified in A.B.C.D format, may be either
contiguous or non-contiguous.
any Enter the keyword any to specify that all routes are subject to the
filter.
host
ip-address
Enter the keyword host and then enter the IP address to specify a
host IP address or hostname.
destination
Enter the IP address of the network or host to which the packets are
sent.
count (OPTIONAL) Enter the keyword count to count packets processed
by the filter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by
the filter.
dscp (OPTIONAL) Enter the keyword dcsp to match to the IP DCSCP
values.
order (OPTIONAL) Enter the keyword order to specify the QoS priority for
the ACL entry. The range is 0 to 254 (where 0 is the highest priority
and 254 is the lowest; lower order numbers have a higher priority). If
you do not use the keyword
order, the ACLs have the lowest order
by default (255).
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing
the traffic that you want to monitor and the ACL in which you are
creating the rule is applied to the monitored interface.
NOTE: For more information, refer to the Flow-based Monitoring
section in the Port Monitoring chapter of the
FTOS Configuration
Guide
.
fragments Enter the keyword fragments to use ACLs to control packet
fragments.
Defaults Not configured.
Command Modes CONFIGURATION-EXTENDED-ACCESS-LIST
198