Version 8.1.1.0
Version 7.4.1.0
Version 6.5.10
Usage
The monitor option is relevant in the context of flow-based monitoring only. For more
Information
information, refer to
The order option is relevant in the context of the Policy QoS feature only. The following
applies:
When you use the log option, the CP processor logs details about the packets that match.
Depending on how many packets match the log entry and at what rate, the CP may become
busy as it has to log these packets' details.
You cannot include IP, TCP, or UDP (Layer 3) filters in an ACL configured with ARP or Ether-
type (Layer 2) filters. Apply Layer 2 ACLs to interfaces in Layer 2 mode.
seq
Assign a sequence number to a deny or permit filter in an extended IP access list while creating the filter.
C-Series, E-Series, S-Series, Z-Series, S4810
Syntax
seq sequence-number {deny | permit} {ip-protocol-number | icmp
| ip | tcp | udp} {source mask | any | host ip-address}
{destination mask | any | host ip-address} [operator port
[port]] [count [byte] | log] [dscp value] [order] [monitor]
[fragments]
Parameters
sequence-
number
deny
permit
ip-protocol-
number
Introduced on the E-Series ExaScale.
Added the monitor option.
Expanded to include the optional QoS order priority for the ACL
entry.
Port
Monitoring.
•
The seq sequence-number command is applicable only in an ACL group.
•
The order option works across ACL groups that have been applied on an interface
via the QoS policy framework.
•
The order option takes precedence over seq sequence-number.
•
If sequence-number is not configured, the rules with the same order value are
ordered according to their configuration order.
•
If sequence-number is configured, the sequence-number is used as a tie breaker
for rules with the same order.
NOTE: When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
Enter a number from 0 to 4294967290. For the S4810, the range is 0 to
65534.
Enter the keyword deny to configure a filter to drop packets meeting
this condition.
Enter the keyword permit to configure a filter to forward packets
meeting this criteria.
Enter a number from 0 to 255 to filter based on the protocol identified
in the IP protocol header.
259