Users Guide
Version Description
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.7(0.0) Introduced on the S6000–ON.
9.2(1.0) Introduced on the Z9500.
9.0.2.0 Introduced on the S6000.
8.3.11.1 Introduced on the Z9000.
8.1.1.0 Introduced on the E-Series (IPv4).
7.8.1.0 Increased the name string to accept up to 140 characters. Prior to 7.8.1.0, names were up
to 16 characters long.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
7.4.1.0 Introduced on the E-Series.
Usage Information
When all sequence numbers are exhausted, this feature permits re-assigning a new sequence number to entries of
an existing access-list.
seq
Assign a sequence number to a deny or permit lter in an extended IP access list while creating the lter.
Syntax
seq sequence-number {deny | permit} {ip-protocol-number | icmp | ip | tcp |
udp} {source mask | any | host ip-address} {destination mask | any | host ip-
address} [operator [portnumber | portname]] [count [byte] | log] [dscp value]
[ecn value] [fragments] [monitor [session-ID]] [no-drop] [order]
Parameters
sequence-number Enter a number from 0 to 4294967290.
deny Enter the keyword deny to congure a lter to drop packets meeting this condition.
permit Enter the keyword permit to congure a lter to forward packets meeting this criteria.
ip-protocol-number Enter a number from 0 to 255 to lter based on the protocol identied in the IP protocol
header.
icmp Enter the keyword icmp to congure an ICMP access list lter.
ip Enter the keyword ip to congure a generic IP access list. The keyword ip species that
the access list permits all IP protocols.
tcp Enter the keyword tcp to congure a TCP access list lter.
udp Enter the keyword udp to congure a UDP access list lter.
source Enter an IP address in dotted decimal format of the network from which the packet was
received.
mask (OPTIONAL) Enter a network mask in /prex format (/x) or A.B.C.D. The mask, when
specied in A.B.C.D format, may be either contiguous or non-contiguous.
any Enter the keyword any to specify that all routes are subject to the lter.
220 Access Control Lists (ACL)










