Service Manual

instead all traffic on the interface. This feature is particularly useful when looking for malicious traffic. It is available
for Layer 2 and Layer 3 ingress and egress traffic. You may specify traffic using standard or extended access-lists.
This mechanism copies all incoming or outgoing packets on one port and forwards (mirrors) them to another port.
The source port is the monitored port (MD) and the destination port is the monitoring port (MG).
Related Commands
permit — configures a MAC address filter to pass packets.
seq — configures a MAC address filter with a specified sequence number.
deny
To drop packets with a certain IP address, configure a filter.
Syntax
deny {any | host mac-address | mac-source-address mac-source-address-mask}{any
| host mac-address | mac-destination-address mac-destination-address-mask}
[ethertype-operator] [count [byte]][log [interval minutes] [threshold-in-msgs
[count]] [monitor]
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filter’s sequence number.
Use the no deny {any | host mac-address | mac-source-address mac-source-
address-mask}{any | host mac-address | mac-destination-address mac-
destination-address-mask}command. command.
Parameters
source Enter the IP address in dotted decimal format of the network from which the packet was
sent.
mask (OPTIONAL) Enter a network mask in /prefix format (/x) or A.B.C.D. The mask, when
specified in A.B.C.D format, may be either contiguous or non-contiguous (discontiguous).
any Enter the keyword any to specify that all routes are subject to the filter.
host ip-address Enter the keyword host and then enter the IP address to specify a host IP address only.
count (OPTIONAL) Enter the keyword count to count packets processed by the filter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by the filter.
log (OPTIONAL) Enter the keyword log to enable the triggering of ACL log messages.
threshold-in msgs
count
(OPTIONAL) Enter the threshold-in-msgs keyword followed by a value to indicate
the maximum number of ACL logs that can be generated, exceeding which the
generation of ACL logs is terminated with the seq, permit, or deny commands. The
threshold range is from 1 to 100.
interval minutes (OPTIONAL) Enter the keyword interval followed by the time period in minutes at
which ACL logs must be generated. The time interval range is from 1 to 10 minutes.
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the traffic that
you want to monitor and the ACL in which you are creating the rule is applied to the
monitored interface.
Defaults
By default, 10 ACL logs are generated, if you do not specify the threshold explicitly.
214 Access Control Lists (ACL)