Version
6.5.1.0
Usage Information
The order option is relevant in the context of the Policy QoS feature only. For more information, see the Quality
of Service section of the Dell Networking OS Configuration Guide.
The monitor option is relevant in the context of flow-based monitoring only. For more information, see
Monitoring
deny tcp
Configure a filter that drops transmission control protocol (TCP) packets meeting the filter criteria.
Syntax
deny tcp {source mask | any | host ip-address} [bit] [operator port [port]]
{destination mask | any | host ip-address} [dscp] [bit] [operator port [port]]
[count [bytes] [order] [fragments] [monitor [session-ID]] [no-drop]
To remove this filter, you have two choices:
•
•
Parameters
source
mask
any
host ip-address
dscp
bit
Description
Expanded to include the optional QoS order priority for the ACL entry.
.
Use the no seq sequence-number command if you know the filter's sequence number.
Use the no deny tcp {source mask | any | host ip-address} {destination mask |
any | host ip-address} command.
Enter the IP address of the network or host from which the packets are sent.
Enter a network mask in /prefix format (/x) or A.B.C.D. The mask, when specified in
A.B.C.D format, may be either contiguous or non-contiguous.
Enter the keyword any to specify that all routes are subject to the filter.
Enter the keyword host then the IP address to specify a host IP address.
Enter this keyword dscp to deny a packet based on the DSCP value. The range is from 0
to 63.
Enter a flag or combination of bits:
•
ack: acknowledgement field
•
fin: finish (no more data from the user)
•
psh: push function
•
rst: reset the connection
•
syn: synchronize sequence numbers
•
urg: urgent field
•
established: datagram of established TCP session
Use the established flag to match only ACK and RST flags of established TCP
session.
You cannot use established along with the other control flags
While using the established flag in an ACL rule, all the other TCP control flags are
masked, to avoid redundant TCP control flags configuration in a single rule. When you use
Port
Access Control Lists (ACL)
203