Dell Z9500 Reference Manual page 239

Hide thumbs Also See for Z9500:
Table of Contents

Advertisement

Parameters
source
mask
any
host ip-address
destination
dscp
count
bytes
order
fragments
log
threshold-in
msgs count
interval
minutes
monitor
Access Control Lists (ACL)
Use the no permit icmp {source mask | any | host ip-address}
{destination mask | any | host ip-address} command.
Enter the IP address of the network or host from which the
packets were sent.
Enter a network mask in /prefix format (/x) or A.B.C.D. The
mask, when specified in A.B.C.D format, may be either
contiguous or noncontiguous.
Enter the keyword any to match and drop specific Ethernet
traffic on the interface.
Enter the keyword host and then enter the IP address to
specify a host IP address.
Enter the IP address of the network or host to which the
packets are sent.
Enter the keyword dscp to deny a packet based on the
DSCP value. The range is 0 to 63.
(OPTIONAL) Enter the keyword count to count packets the
filter processes.
(OPTIONAL) Enter the keyword byte to count bytes the filter
processes.
(OPTIONAL) Enter the keyword order to specify the QoS
priority for the ACL entry. The range is 0 to 254 (where 0 is
the highest priority and 254 is the lowest; lower-order
numbers have a higher priority). If you do not use the
keyword order, the ACLs have the lowest order by default
(255).
Enter the keyword fragments to use ACLs to control packet
fragments.
(OPTIONAL) Enter the keyword log to include ACL
messages in the log.
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated with the seq, permit, or deny
commands. The threshold range is from 1 to 100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
The threshold range is from 1 to 10 minutes.
(OPTIONAL) Enter the keyword monitor when the rule is
describing the traffic that you want to monitor and the ACL
in which you are creating the rule is applied to the monitored
interface. For more information, refer to the "Flow-based
239

Advertisement

Table of Contents
loading

Table of Contents