Reference Guide

seq 5 deny ip any 191.1.0.0 /16 count (0x00 packets)
seq 10 deny ip any 191.2.0.0 /16 order 4
seq 15 deny ip any 191.3.0.0 /16
seq 20 deny ip any 191.4.0.0 /16
seq 25 deny ip any 191.5.0.0 /16
Dell#show ip accounting access-list L3-ACL vrf vrf3
!
Standard Ingress IP access list L3-ACL on vrf3
Total cam count 3
seq 5 permit 10.1.2.0/24
seq 10 permit 20.1.2.0/24
seq 15 permit 30.1.2.0/24
Dell#
Standard IP ACL Commands
When you create an ACL without any rule and then apply it to an interface, the ACL behavior reflects an
implicit permit.
The S4820T supports both Ingress and Egress IP ACLs.
NOTE: Also refer to the Commands Common to all ACL Types and Common IP ACL Commands
sections.
deny
To drop packets with a certain IP address, configure a filter.
S4820T
Syntax
deny {source | any | host {ip-address}}
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filter’s
sequence number.
Use the no deny {source [mask] | any | host ip-address}
command.
Parameters
source Enter the IP address in dotted decimal format of the network
from which the packet was sent.
any Enter the keyword any to specify that all routes are subject
to the filter. You can enter any of the following keywords to
specify route types.
bytes — Enter the keyword count to count packets the
filter processes.
count — Enter the keyword bytesorder to count bytes
the filter processes.
210
Access Control Lists (ACL)