Reference Guide

Defaults Not configured.
Command Modes CONFIGURATION-EXTENDED-ACCESS-LIST
Command History
Version 8.2.1.0 Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
Version 8.1.1.0 Introduced on the E-Series ExaScale.
Version 7.4.1.0 Added the monitor option.
Version 6.5.1.0 Expanded to include the optional QoS order priority for the ACL
entry.
Usage
Information
The order option is relevant in the context of the Policy QoS feature only. For more
information, refer to the Quality of Service chapter of the
FTOS Configuration Guide
.
The monitor option is relevant in the context of flow-based monitoring only. For more
information, refer to the Port Monitoring chapter.
When you use the log option, the CP processor logs details the packets that match.
Depending on how many packets match the log entry and at what rate, the CP may become
busy as it has to log these packets’ details.
You cannot include IP, TCP or UDP (Layer 3) filters in an ACL configured with ARP or Ether-type
(Layer 2) filters. Apply Layer 2 ACLs (ARP and Ether-type) to Layer 2 interfaces only.
NOTE: When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
deny icmp
Configure a filter to drop all or specific internet control message protocol (ICMP) messages.
E-Series, Z-Series, S4810
Syntax
deny icmp {source mask | any | host ip-address} {destination
mask | any | host ip-address} [dscp] [message-type] [count
[byte] | log] [order] [monitor] [fragments]
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filter’s sequence
number.
Use the no deny icmp {source mask | any | host ip-address}
{destination mask | any | host ip-address} command.
Parameters
source
Enter the IP address of the network or host from which the packets
were sent.
mask
Enter a network mask in /prefix format (/x) or A.B.C.D. The mask,
when specified in A.B.C.D format, may be either contiguous or non-
contiguous.
any Enter the keyword any to specify that all routes are subject to the
filter.
257