Reference Guide

Access Control Lists (ACL) | 189
deny
c e s
Configure a filter to drop packets with a certain IP address.
Syntax
deny {source [mask] | any | host ip-address} [count [byte] | log] [dscp value] [order] [monitor]
[fragments]
To remove this filter, you have two choices:
Use the
no seq sequence-number command syntax if you know the filters
sequence number or
Use the
no deny {source [mask] | any | host ip-address} command.
Parameters
Defaults
Not configured.
Command Modes
CONFIGURATION-STANDARD-ACCESS-LIST
source Enter the IP address in dotted decimal format of the network from which
the packet was sent.
mask
(OPTIONAL) Enter a network mask in /prefix format (/x) or A.B.C.D.
The mask, when specified in A.B.C.D format, may be either contiguous or
non-contiguous (discontiguous).
any
Enter the keyword any to specify that all routes are subject to the filter.
host ip-address
Enter the keyword host followed by the IP address to specify a host IP
address only.
count
(OPTIONAL) Enter the keyword count to count packets processed by the
filter.
byte
(OPTIONAL) Enter the keyword byte to count bytes processed by the
filter.
log
(OPTIONAL, E-Series only) Enter the keyword log to enter ACL matches
in the log.
dscp
(OPTIONAL) Enter the keyword dcsp to match to the IP DCSCP values.
order
(OPTIONAL) Enter the keyword order to specify the QoS order of
priority for the ACL entry.
Range: 0-254 (where 0 is the highest priority and 254 is the lowest;
lower order numbers have a higher priority)
Default: If the order keyword is not used, the ACLs have the lowest
order by default(255).
monitor
(OPTIONAL) Enter the keyword monitor when the rule is describing the
traffic that you want to monitor and the ACL in which you are creating the
rule will be applied to the monitored interface. For details, refer to the
section “Flow-based Monitoring” in the Port Monitoring chapter of the
FTOS Configuration Guide.
fragments Enter the keyword fragments to use ACLs to control packet fragments.