Dell Force10 S4820T FTOS Command Reference Guide - Page 209
deny icmp
View all Dell Force10 S4820T manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 209 highlights
Command History Usage Information Version 8.2.1.0 Version 8.1.1.0 Version 7.4.1.0 Version 6.5.10 Allows ACL control of fragmented packets for IP (Layer 3) ACLs. Introduced on E-Series ExaScale Added monitor option Expanded to include the optional QoS order priority for the ACL entry. The order option is relevant in the context of the Policy QoS feature only. Refer to the "Quality of Service" chapter of the FTOS Configuration Guide for more information. When you use the log option, CP processor logs details about the packets that match. Depending on how many packets match the log entry and at what rate, the CP may become busy as it has to log these packets' details. The monitor option is relevant in the context of flow-based monitoring only. Refer to the Port Monitoring chapter. You cannot include IP, TCP or UDP (Layer 3) filters in an ACL configured with ARP or Ether-type (Layer 2) filters. Apply Layer 2 ACLs (ARP and Ether-type) to Layer 2 interfaces only. Note: When ACL logging and byte counters are configured simultaneously, byte counters may display an incorrect value. Configure packet counters with logging instead. deny icmp e Configure a filter to drop all or specific ICMP messages. Syntax deny icmp {source mask | any | host ip-address} {destination mask | any | host ip-address} [dscp] [message-type] [count [byte] | log] [order] [monitor] [fragments] To remove this filter, you have two choices: • Use the no seq sequence-number command syntax if you know the filter's sequence number or • Use the no deny icmp {source mask | any | host ip-address} {destination mask | any | host ip-address} command. Parameters source mask any host ip-address destination dscp Enter the IP address of the network or host from which the packets were sent. Enter a network mask in /prefix format (/x) or A.B.C.D. The mask, when specified in A.B.C.D format, may be either contiguous or non-contiguous. Enter the keyword any to specify that all routes are subject to the filter. Enter the keyword host followed by the IP address to specify a host IP address. Enter the IP address of the network or host to which the packets are sent. Enter this keyword to deny a packet based on DSCP value. Range: 0-63 Access Control Lists (ACL) | 209