White Papers

Table Of Contents
Related
Commands
ip access-list extended create an extended ACL.
permit tcp assign a permit filter for TCP packets.
permit udp assign a permit filter for UDP packets.
permit icmp
Configure a filter to allow all or specific ICMP messages.
Syntax
permit icmp {source mask | any | host ip-address} {destination mask |
any | host ip-address} [dscp] [message-type] [count [byte] | log] [order]
[monitor] [fragments] [no-drop]
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filters sequence number.
Use the no permit icmp {source mask | any | host ip-address} {destination
mask | any | host ip-address} command.
Parameters
source
Enter the IP address of the network or host from which the packets were sent.
mask
Enter a network mask in /prefix format (/x) or A.B.C.D. The mask, when specified
in A.B.C.D format, may be either contiguous or noncontiguous.
any Enter the keyword any to match and drop specific Ethernet traffic on the
interface.
host
ip-address
Enter the keyword host and then enter the IP address to specify a host IP
address.
destination
Enter the IP address of the network or host to which the packets are sent.
dscp Enter the keyword dscp to deny a packet based on the DSCP value. The range is 0
to 63.
message-type
(OPTIONAL) Enter an ICMP message type, either with the type (and code, if
necessary) numbers or with the name of the message type. The range is 0 to 255
for ICMP type and 0 to 255 for ICMP code.
count (OPTIONAL) Enter the keyword count to count packets the filter processes.
byte (OPTIONAL) Enter the keyword byte to count bytes the filter processes.
log (OPTIONAL, E-Series only) Enter the keyword log to have the information kept in
an ACL log file.
order (OPTIONAL) Enter the keyword order to specify the QoS priority for the ACL
entry. The range is 0 to 254 (where 0 is the highest priority and 254 is the lowest;
lower-order numbers have a higher priority). If you do not use the keyword order,
the ACLs have the lowest order by default (255).
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the traffic
that you want to monitor and the ACL in which you are creating the rule is applied
to the monitored interface.
NOTE: For more information, refer to the Flow-based Monitoring section in
the Port Monitoring chapter of the FTOS Configuration Guide.
fragments Enter the keyword fragments to use ACLs to control packet fragments.
no-drop Enter the keywords no-drop to match only the forwarded packets.
Defaults Not configured.
Command Modes CONFIGURATION-STANDARD-ACCESS-LIST
190 Access Control Lists (ACL)