Reference Guide

deny (MAC)
Congures a lter to drop packets with a specic MAC address.
Syntax
deny {nn:nn:nn:nn:nn:nn [00:00:00:00:00:00] | any} {nn:nn:nn:nn:nn:nn
[00:00:00:00:00:00] | any} [protocol-number | capture | cos | count | vlan]
Parameters
nn:nn:nn:nn:nn:nn — Enter the MAC address of the network from or to which the packets are sent.
00:00:00:00:00:00 — (Optional) Enter which bits in the MAC address must match. If you do not enter a
mask, a mask of
00:00:00:00:00:00 applies.
any — (Optional) Set routes which are subject to the lter.
protocol-number — (Optional) MAC protocol number identied in the header (600 to ).
capture — (Optional) Capture packets the lter processes.
cos — (Optional) CoS value (0 to 7).
count — (Optional) Count packets the lter processes.
vlan — (Optional) VLAN number (1 to 4094).
Default Disabled
Command Mode MAC-ACL
Usage Information OS10 cannot count both packets and bytes when you use the count byte options — only bytes increment. The
no version of this command removes the lter.
Example
OS10(config)# mac access-list macacl
OS10(conf-mac-acl)# deny any any cos 7
OS10(conf-mac-acl)# deny any any vlan 2
Supported Releases 10.2.0E or later
deny icmp
Congures a lter to drop all or specic internet control message protocol (ICMP) messages.
Syntax
deny icmp [A.B.C.D | A.B.C.D/x | any | host ip-address] [[A.B.C.D | A.B.C.D/x |
any | host ip-address] [capture | count [byte] | dscp value | fragment]
Parameters
A.B.C.D — Enter the IP address in hexadecimal format separated by colons.
A.B.C.D/x — Enter the number of bits to match to the IP address.
any — (Optional) Set all routes subject to the lter.
capture — (Optional) Capture packets the lter processes.
count — (Optional) Count packets the lter processes.
byte — (Optional) Count bytes the lter processes.
dscp value — (Optional) Deny a packet based on the DSCP values (0 to 63).
fragment — (Optional) Use ACLs to control packet fragments.
host ip-address — (Optional) Enter the IP address to use a host address only.
Default Not congured
390 Access Control Lists