Reference Guide

Access Control Lists (ACL) | 209
Command
History
Usage
Information
The order option is relevant in the context of the Policy QoS feature only. Refer to the
“Quality of Service” chapter of the FTOS Configuration Guide for more information.
When you use the
log option, CP processor logs details about the packets that match.
Depending on how many packets match the
log entry and at what rate, the CP may
become busy as it has to log these packets’ details.
The
monitor option is relevant in the context of flow-based monitoring only. Refer to
the Port Monitoring chapter.
You cannot include IP, TCP or UDP (Layer 3) filters in an ACL configured with ARP
or Ether-type (Layer 2) filters. Apply Layer 2 ACLs (ARP and Ether-type) to Layer 2
interfaces only.
deny icmp
e
Configure a filter to drop all or specific ICMP messages.
Syntax
deny icmp {source mask | any | host ip-address} {destination mask | any | host ip-address}
[
dscp] [message-type] [count [byte] | log] [order] [monitor] [fragments]
To remove this filter, you have two choices:
Use the
no seq sequence-number command syntax if you know the filters
sequence number or
•Use the
no deny icmp {source mask | any | host ip-address} {destination mask | any |
host ip-address} command.
Parameters
Version 8.2.1.0 Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
Version 8.1.1.0 Introduced on E-Series ExaScale
Version 7.4.1.0 Added
monitor option
Version 6.5.10 Expanded to include the optional QoS
order priority for the ACL entry.
Note: When ACL logging and byte counters are configured simultaneously, byte
counters may display an incorrect value. Configure packet counters with logging
instead.
source
Enter the IP address of the network or host from which the packets were sent.
mask
Enter a network mask in /prefix format (/x) or A.B.C.D. The mask, when
specified in A.B.C.D format, may be either contiguous or non-contiguous.
any
Enter the keyword any to specify that all routes are subject to the filter.
host ip-address
Enter the keyword host followed by the IP address to specify a host IP
address.
destination
Enter the IP address of the network or host to which the packets are sent.
dscp
Enter this keyword to deny a packet based on DSCP value.
Range: 0-63