Service Manual

instead all traffic on the interface. This feature is particularly useful when looking for malicious traffic. It is available
for Layer 2 and Layer 3 ingress and egress traffic. You may specify traffic using standard or extended access-lists.
This mechanism copies all incoming or outgoing packets on one port and forwards (mirrors) them to another port.
The source port is the monitored port (MD) and the destination port is the monitoring port (MG).
Related Commands
permit – assigns a permit filter for IP packets.
permit udp – assigns a permit filter for UDP packets.
permit icmp
To allow all or specific internet control message protocol (ICMP) messages, configure a filter.
Syntax
permit icmp {source address mask | any | host ipv6-address} {destination
address | any | host ipv6-address} [message-type] [count [byte]] | [log]
[interval minutes] [threshold-in-msgs [count]][monitor]
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filter’s sequence number.
Use the no permit icmp {source address mask | any | host ipv6-address}
{destination address | any | host ipv6-address} command.
Parameters
source address Enter the IPv6 address of the network or host from which the packets were sent in the
x:x:x:x::x format then the prefix length in the /x format. The range is from /0 to /128.
The :: notation specifies successive hexadecimal fields of zero.
mask Enter a network mask in /prefix format (/x).
any Enter the keyword any to specify that all routes are subject to the filter.
host ipv6-address Enter the keyword host then the IPv6 address of the host in the x:x:x:x::x format. The ::
notation specifies successive hexadecimal fields of zero.
destination address Enter the IPv6 address of the network or host to which the packets are sent in the
x:x:x:x::x format then the prefix length in the /x format. The range is from /0 to /128.
The :: notation specifies successive hexadecimal fields of zero.
message-type (OPTIONAL) Enter an ICMP message type, either with the type (and code, if necessary)
numbers or with the name of the message type. The range is from 0 to 255 for ICMP
type and from 0 to 255 for ICMP code.
count (OPTIONAL) Enter the keyword count to count packets the filter processes.
byte (OPTIONAL) Enter the keyword byte to count bytes the filter processes.
log (OPTIONAL) Enter the keyword log to enable the triggering of ACL log messages.
threshold-in-msgs
count
(OPTIONAL) Enter the threshold-in-msgs keyword followed by a value to indicate
the maximum number of ACL logs that can be generated, exceeding which the
generation of ACL logs is terminated with the seq, permit, or deny commands. The
threshold range is from 1 to 100.
interval minutes (OPTIONAL) Enter the keyword interval followed by the time period in minutes at
which ACL logs must be generated. The interval range is from 1 to 10 minutes.
Access Control Lists (ACL) 245