Download Print this page

Dell Force10 TeraScale E Series Reference Manual page 217

Ftos command line, ftos 8.4.2.7

Advertisement

seq
c e s
Assign a sequence number to a deny or permit filter in an IP access list while creating the filter.
seq sequence-number {deny | permit} {source [mask] | any | host ip-address}} [count
Syntax
[byte] | log] [dscp value] [order] [monitor] [fragments]
Parameters
sequence-number
deny
permit
source
mask
any
host ip-address
count
byte
log
dscp
order
monitor
fragments
Defaults
Not configured
Command Modes
CONFIGURATION-STANDARD-ACCESS-LIST
Command
Version 8.3.1.0
History
Version 8.2.1.0
Version 8.1.1.0
Version 7.6.1.0
Version 7.5.1.0
Enter a number from 0 to 4294967290.
Enter the keyword
condition.
permit
Enter the keyword
criteria.
Enter a IP address in dotted decimal format of the network from which the
packet was received.
(OPTIONAL) Enter a network mask in /prefix format (/x) or A.B.C.D. The
mask, when specified in A.B.C.D format, may be either contiguous or
non-contiguous.
Enter the keyword
Enter the keyword
address or hostname.
(OPTIONAL) Enter the keyword
filter.
(OPTIONAL) Enter the keyword
(OPTIONAL, E-Series only) Enter the keyword
the log.
(OPTIONAL) Enter the keyword
(OPTIONAL) Enter the keyword
entry.
Range: 0-254 (where 0 is the highest priority and 254 is the lowest; lower order
numbers have a higher priority)
Default: If the order keyword is not used, the ACLs have the lowest order by
default (255).
(OPTIONAL) Enter the keyword
traffic that you want to monitor and the ACL in which you are creating the rule
will be applied to the monitored interface. For details, see the section
"Flow-based Monitoring" in the Port Monitoring chapter of the FTOS
Configuration Guide.
Enter the keyword
Add DSCP value for ACL matching.
Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
Introduced on E-Series ExaScale
Added support for S-Series
Added support for C-Series
deny
to configure a filter to drop packets meeting this
to configure a filter to forward packets meeting this
any
to specify that all routes are subject to the filter.
host
followed by the IP address to specify a host IP
count
to count packets processed by the
byte
to count bytes processed by the filter.
dcsp
to match to the IP DCSCP values.
order
to specify the QoS order for the ACL
monitor
when the rule is describing the
fragments
to use ACLs to control packet fragments.
log
to enter ACL matches in
Access Control Lists (ACL) | 217

Advertisement

loading