Users Guide

Version Description
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
8.3.1.0 Add the DSCP value for ACL matching.
8.2.1.0 Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
8.1.1.0 Introduced on the E-Series.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
7.4.1.0 Added support for the non-contiguous mask and added the monitor option.
6.5.10 Expanded to include the optional QoS order priority for the ACL entry.
Usage Information
The order option is relevant in the context of the Policy QoS feature only. The following applies:
The seq sequence-number command is applicable only in an ACL group.
The order option works across ACL groups that are applied on an interface via the QoS policy framework.
The order option takes precedence over seq sequence-number.
If you do not congure sequence-number, the rules with the same order value are ordered according to
their conguration order.
If you congure sequence-number, the sequence-number is used as a tie breaker for rules with the same
order.
Related Commands
denycongure a lter to drop packets.
permitcongure a lter to forward packets.
Extended IP ACL Commands
When an ACL is created without any rule and then applied to an interface, ACL behavior reects an implicit permit.
The following commands congure extended IP ACLs, which in addition to the IP address, also examine the packet’s protocol type.
The platform supports both Ingress and Egress IP ACLs.
NOTE
: Also refer to the Commands Common to all ACL Types and Common IP ACL Commands sections.
deny
Congure a lter that drops IP packets meeting the lter criteria.
Syntax
deny {ip | ip-protocol-number} {source mask | any | host ip-address}
{destination mask | any | host ip-address} [ttl operator][count [byte] | log]
[dscp value] [order] [monitor] [fragments] [no-drop]
To remove this lter, you have two choices:
Use the no seq sequence-number command if you know the lter’s sequence number.
224 Access Control Lists (ACL)