Command Line Reference Guide

This feature is particularly useful when looking for malicious traffic. It is available for
Layer 2 and Layer 3 ingress and egress traffic. You may specify traffic using
standard or extended access-lists. This mechanism copies all incoming or outgoing
packets on one port and forwards (mirrors) them to another port. The source port
is the monitored port (MD) and the destination port is the monitoring port (MG).
Related
Commands
deny – assigns a filter to deny IP traffic.
deny udp – assigns a filter to deny UDP traffic.
deny icmp (for Extended IPv6 ACLs)
Configure a filter to drop all or specific ICMP messages.
Syntax
deny icmp {source address mask | any | host ipv6-address}
{destination address | any | host ipv6-address} [count [byte]]
| [log [interval minutes] [threshold-in-msgs [count]] [monitor]
To remove this filter, you have two choices:
Use the no seq sequence-number command syntax if you know the filter’s
sequence number
Use the no deny icmp {source address mask | any | host ipv6-
address} {destination address | any | host ipv6-address}
command
Parameters `
source Enter the IPv6 address of the network or host from which the
packets were sent.
mask Enter a network mask in /prefix format (/x) or A.B.C.D. The
mask, when specified in A.B.C.D format, may be either
contiguous or non-contiguous.
any Enter the keyword any to specify that all routes are subject
to the filter.
host ipv6–
address
Enter the keyword host then the IPv6 address to specify a
host IP address.
destination Enter the IPv6 address of the network or host to which the
packets are sent.
count (OPTIONAL) Enter the keyword count to count packets
processed by the filter.
byte (OPTIONAL) Enter the keyword byte to count bytes
processed by the filter.
log (OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
282
Access Control Lists (ACL)