Usage
show ip
Information
accounting
access-lists
Field
"Extended IP..."
"seq 5..."
"order 4"
Example
FTOS#show ip accounting access FILTER1 interface gig 1/6
Extended IP access list FILTER1
seq 5 deny ip any 191.1.0.0 /16 count (0x00 packets)
seq 10 deny ip any 191.2.0.0 /16 order 4
seq 15 deny ip any 191.3.0.0 /16
seq 20 deny ip any 191.4.0.0 /16
seq 25 deny ip any 191.5.0.0 /16
Standard IP ACL Commands
When you create an ACL without any rule and then apply it to an interface, the ACL behavior reflects an implicit permit.
The C-Series and S-Series platforms (except the S4810) support Ingress IP ACLs only.
The S4810 and Z9000 support both Ingress and Egress IP ACLs.
NOTE: Also refer to the
deny
Configure a filter to drop packets with a certain IP address.
C-Series, E-Series, S-Series, Z-Series, S4810
Syntax
deny {source [mask] | any | host ip-address} [count [byte] |
log] [dscp value] [order] [monitor] [fragments]
To remove this filter, you have two choices:
Parameters
source
mask
Description
Displays the name of the IP ACL.
Displays the filter. If the keywords count or byte were configured
in the filter, the number of packets or bytes processed by the filter is
displayed at the end of the line.
Displays the QoS order of priority for the ACL entry.
Commands Common to all ACL Types
•
Use the no seq sequence-number command if you know the filter's sequence
number.
•
Use the no deny {source [mask] | any | host ip-address}
command.
Enter the IP address in dotted decimal format of the network from
which the packet was sent.
(OPTIONAL) Enter a network mask in /prefix format (/x) or A.B.C.D.
The mask, when specified in A.B.C.D format, may be either
contiguous or non-contiguous (discontiguous).
and
Common IP ACL Commands
sections.
239