Reference Guide
Access Control Lists (ACL) | 225
When you use the log option, CP processor logs details about the packets that match. 
Depending on how many packets match the 
log entry and at what rate, the CP may 
become busy as it has to log these packets’ details.
The 
monitor option is relevant in the context of the flow-based monitoring feature 
only. Refer to the Port Monitoring chapter. 
permit tcp 
c e s
Configure a filter to pass TCP packets meeting the filter criteria.
Syntax
permit tcp {source mask | any | host ip-address} [bit] [operator port [port]] 
{
destination mask | any | host ip-address} [bit] [dscp] [operator port [port]] [count [byte] | 
log] [order] [monitor] [fragments]
To remove this filter, you have two choices: 
• Use the 
no seq sequence-number command syntax if you know the filter’s 
sequence number or 
•Use the 
no permit tcp {source mask | any | host ip-address} {destination mask | any | 
host ip-address} command.
Parameters
Note: When ACL logging and byte counters are configured simultaneously, byte 
counters may display an incorrect value. Configure packet counters with logging 
instead.
source
Enter the IP address of the network or host from which the packets were sent.
mask
Enter a network mask in /prefix format (/x) or A.B.C.D. The mask, when 
specified in A.B.C.D format, may be either contiguous or non-contiguous. 
any
Enter the keyword any to specify that all routes are subject to the filter.
host ip-address Enter the keyword host followed by the IP address to specify a host IP 
address.
bit Enter a flag or combination of bits:
ack: acknowledgement field
fin: finish (no more data from the user)
psh: push function
rst: reset the connection
syn: synchronize sequence numbers
urg: urgent field
dscp
Enter this keyword to deny a packet based on DSCP value.
Range: 0-63










