Command Line Reference Guide
Access Control Lists (ACL) | 241
Command Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
Command
History
Usage
Information
The monitor option is relevant in the context of the flow-based monitoring feature only. See
Chapter 45, Port Monitoring.
When you use the log option, CP processor logs details about the packets that match. Depending on
how many packets match the log entry and at what rate, the CP may become busy as it has to log these
packets’ details.
The order option is relevant in the context of the Policy QoS feature only. The following applies:
• The seq sequence-number is applicable only in an ACL group.
• The order option works across ACL groups that have been applied on an interface via QoS policy
framework.
• The order option takes precedence over the seq sequence-number.
• If sequence-number is not configured, then rules with the same order value are ordered
according to their configuration order.
• If the sequence-number is configured, then the sequence-number is used as a tie breaker for
rules with the same order.
You cannot include IP, TCP or UDP (Layer 3) filters in an ACL configured with ARP or Ether-type
(Layer 2) filters. Apply Layer 2 filters to interfaces in Layer 2 mode.
seq
c e s
Assign a sequence number to a deny or permit filter in an extended IP access list while creating the
filter.
Syntax
seq sequence-number {deny | permit} {ip-protocol-number | icmp | ip | tcp | udp}
{source mask | any | host ip-address} {destination mask | any | host ip-address} [operator
port [port]] [count [byte] | log] [dscp value] [order] [monitor] [fragments]
Parameters
Version 8.2.1.0 Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
Version 8.1.1.0 Introduced on E-Series ExaScale
Version 7.4.1.0
Added
monitor option
Version 6.5.10
Expanded to include the optional QoS
order priority for the ACL entry.
Note: When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
sequence-number
Enter a number from 0 to 4294967290.
deny Enter the keyword deny to configure a filter to drop packets meeting this condition.
permit Enter the keyword permit to configure a filter to forward packets meeting this
criteria.
ip-protocol-number
Enter a number from 0 to 255 to filter based on the protocol identified in the IP
protocol header.
icmp Enter the keyword icmp to configure an ICMP access list filter.
ip Enter the keyword ip to configure a generic IP access list. The keyword ip specifies
that the access list will permit all IP protocols.