API Guide

count (Optional) Count packets the filter processes.
byte (Optional) Count bytes the filter processes.
dscp value (Optional) Permit a packet based on the DSCP values, from 0 to 63.
fragment (Optional) Use ACLs to control packet fragments.
log (Optional) Enables ACL logging. Information about packets that match an ACL rule are logged.
operator (Optional) Enter a logical operator to match the packets on the specified port number.
The following options are available:
eq Equal to
gt Greater than
lt Lesser than
neq Not equal to
range Range of ports, including the specified port numbers.
Default Not configured
Command Mode IPV6-ACL
Usage
Information
OS10 cannot count both packets and bytes; when you enter the count byte options, only bytes
increment. The no version of this command removes the filter.
Example
OS10(conf-ipv6-acl)# permit udp any any capture session 1 count
Supported
Releases
10.2.0E or later
remark
Specifies an ACL entry description.
Syntax
remark description
Parameters description Enter a description. A maximum of 80 charaters.
Default Not configured
Command Mode IPV4-ACL
Usage
Information
Configure up to 16777214 remarks for a given IPv4, IPv6, or MAC. The no version of the command
removes the ACL entry description.
Supported
Releases
10.2.0E or later
seq deny
Assigns a sequence number to deny IPv4 addresses while creating the filter.
Syntax
seq sequence-number deny [protocol-number | icmp | ip | tcp | udp] [A.B.C.D
| A.B.C.D/x | any | host ip-address] [A.B.C.D | A.B.C.D/x | any | host ip-
address] [capture | count | dscp value | fragment | log]
Parameters
sequence-number Enter the sequence number to identify the ACL for editing and sequencing
number, from 1 to 16777214.
protocol-number (Optional) Enter the protocol number, from 0 to 255.
icmp (Optional) Enter the ICMP address to deny.
ip (Optional) Enter the IPv4 address to deny.
tcp (Optional) Enter the TCP address to deny.
udp (Optional) Enter the UDP address to deny.
A.B.C.D (Optional) Enter the IPv4 address in dotted decimal format.
1152 Access Control Lists