Reference Guide

Access Control Lists (ACL) | 195
The C-Series and S-Series cannot count both packets and bytes, so when you enter the count byte
options, only bytes are incremented.
The monitor option is relevant in the context of flow-based monitoring only. See Chapter 30, Port
Monitoring.
Most ACL rules require one entry in the CAM. However, rules with TCP and UDP port operators (gt,
lt, range) may require more than one entry. The range of ports is configured in the CAM based on
bitmask boundaries; the space required depends on exactly what ports are included in the range.
For example, an ACL rule with TCP port range 4000 - 8000 uses 8 entries in the CAM:
But an ACL rule with TCP port lt 1023 takes only one entry in the CAM:
Related
Commands
deny udp
c e s z
Configure a filter to drop UDP packets meeting the filter criteria.
Syntax
deny udp {source mask | any | host ip-address} [operator port [port]] {destination mask | any
| host ip-address} [dscp] [operator port [port]] [count [byte] | log] [order] [monitor]
[fragments]
To remove this filter, you have two choices:
Use the no seq sequence-number command syntax if you know the filters sequence number or
Use the no deny udp {source mask | any | host ip-address} {destination mask | any | host
ip-address} command.
Note: When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
Rule# Data Mask From To #Covered
1 0000111110100000 1111111111100000 4000 4031 32
2 0000111111000000 1111111111000000 4032 4095 64
3 0001000000000000 1111100000000000 4096 6143 2048
4 0001100000000000 1111110000000000 6144 7167 1024
5 0001110000000000 1111111000000000 7168 7679 512
6 0001111000000000 1111111100000000 7680 7935 256
7 0001111100000000 1111111111000000 7936 7999 64
8 0001111101000000 1111111111111111 8000 8000 1
Total Ports: 4001
Rule# Data Mask From To #Covered
1 0000000000000000 1111110000000000 0 1023 1024
Total Ports: 1024
deny Assign a filter to deny IP traffic.
deny udp Assign a filter to deny UDP traffic.