Reference Guide

Table Of Contents
deny tcp
Configures a filter that drops Transmission Control Protocol (TCP) packets meeting the filter criteria.
Syntax
deny tcp [A.B.C.D | A.B.C.D/x | any | host ip-address [operator]] [[A.B.C.D
| A.B.C.D/x | any | host ip-address [operator]] [ack | fin | psh | rst |
syn | urg] [capture | dscp value | fragment]
Parameters
A.B.C.D Enter the IP address in A.B.C.D format.
A.B.C.D/x Enter the number of bits to match in A.B.C.D/x format.
any (Optional) Enter to subject all routes to the filter:
capture (Optional) Capture packets the filter processes.
dscp value (Optional) Deny a packet based on the DSCP values, from 0 to 63.
fragment (Optional) Use ACLs to control packet fragments.
ack (Optional) Set the bit as acknowledgement.
fin (Optional) Set the bit as finishno more data from sender.
psh (Optional) Set the bit as push.
rst (Optional) Set the bit as reset.
syn (Optional) Set the bit as synchronize.
urg (Optional) Set the bit set as urgent.
operator (Optional) Enter a logical operator to match the packets on the specified port number.
The following options are available:
eq Equal to
gt Greater than
lt Lesser than
neq Not equal to
range Range of ports, including the specified port numbers.
host ip-address (Optional) Enter the keyword and the IP address to use a host address only.
Default Not configured
Command Mode IPV4-ACL
Usage
Information
The no version of this command removes the filter.
Example
OS10(config)# ip access-list testflow
OS10(conf-ipv4-acl)# deny tcp any any capture session 1
Supported
Releases
10.2.0E or later
deny tcp (IPv6)
Configures a filter that drops TCP IPv6 packets meeting the filter criteria.
Syntax
deny tcp [A::B | A::B/x | any | host ipv6-address [operator]] [A::B | A:B/x
| any | host ipv6-address [operator]] [ack | fin | psh | rst | syn | urg]
[capture | dscp value | fragment]
Parameters
A::B Enter the IPv6 address in hexadecimal format separated by colons.
A::B/x Enter the number of bits to match to the IPv6 address.
any (Optional) Set all routes which are subject to the filter:
capture (Optional) Capture packets the filter processes.
dscp value (Optional) Deny a packet based on the DSCP values, from 0 to 63.
fragment (Optional) Use ACLs to control packet fragments.
operator (Optional) Enter a logical operator to match the packets on the specified port number.
The following options are available:
Access Control Lists 579