Related Commands

When you use the log option, the CP processor logs detail the packets that match. Depending on how many packets match the log entry and at what rate, the CP may become busy as it has to log these packets’ details.

The monitor option is relevant in the context of flow-based monitoring only. For more information, refer to the Port Monitoring chapter.

The C-Series and S-Series cannot count both packets and bytes, when you enter the count byte options, only bytes are incremented.

NOTE: When you configure ACL logging and byte counters simultaneously, byte counters may display an incorrect value. Configure packet counters with logging instead.

deny tcp — assigns a filter to deny TCP packets.

deny udp — assigns a filter to deny UDP packets.

ip access-list extended — creates an extended ACL.

deny icmp

To drop all or specific internet control message protocol (ICMP) messages, configure a filter.

Syntaxdeny icmp {source mask any host ip-address} {destination mask any host ip-address} [dscp] [count [byte] [order] [fragments]

To remove this filter, you have two choices:

Use the no seq sequence-numbercommand if you know the filter’s sequence number.

Use the no deny icmp {source mask any host ip-address} {destination mask any host ip-address} command.

Parameters

Enter the IP address of the network or host from which the

source

 

packets were sent.

mask

Enter a network mask in /prefix format (/x) or A.B.C.D. The

 

mask, when specified in A.B.C.D format, may be either

 

contiguous or non-contiguous.

any

Enter the keyword any to specify that all routes are subject

 

to the filter.

host ip-address

Enter the keyword host then the IP address to specify a host

 

IP address.

destination

Enter the IP address of the network or host to which the

 

packets are sent.

dscp

Enter this keyword dscp to deny a packet based on the

 

DSCP value. The range is from 0 to 63.

200

Access Control Lists (ACL)

Page 200
Image 200
Dell 9.7(0.0) manual Deny icmp, Related Commands