11.6. Extend ACL Commands
11.6.1. ip access-list extend
Command Purpose
Use this command to create extend IP ACL and then enter extend IP ACL configuration mode.
To remove this ACL, use the no form of this command.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
ip access-list ACL_NAME extend
no ip access-list ACL_NAME extend
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
ACL_NAME |
The name of an extend IP ACL |
A string with up to 40 characters |
Command Mode
Global Config
Default
None
Usage
If the system already has an extend IP ACL with the same name, this command will enter the extend IP ACL configuration mode. However, if the ACL name is used by other type of ACL, a prompt message will be shown.
When the name is not used by any ACL, this command is to create an extend IP ACL firstly and then enter the extend IP ACL configuration mode.
On how to apply the created extend IP ACL in the interface, please refer to the usage of match access-group command in related chapter.
Examples
This example shows how to create an extend IP ACL named list_ipv4_1 and then enter the extend IP ACL configuration mode:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)#
This example shows how to remove the extend IP ACL named list_ipv4_1:
Switch# configure terminal
Switch(config)# no ip access-list list_ipv4_1 extend
11.6.2. sequence-num
Command Purpose
Use this command to delete a filter from extend IP ACL.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
no sequence-num SEQUENCE_NUM
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
SEQUENCE_NUM |
The sequence number of an IP filter |
1-131071 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
None
Examples
This example shows how to delete an IP or MAC filter with sequence number 10 from an extend IP ACL:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# no sequence-num 10
Related Commands
deny
deny udp
deny icmp
deny igmp
permit
permit tcp
permit udp
permit icmp
permit igmp
deny src-mac
permit src-mac
11.6.3. deny src-mac
Command Purpose
Use this command to create a filter for discarding ongoing packets matching the filter rule.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) deny src-mac ( any | MAC_ADDR MAC_ADDR_MASK | host MAC_ADDR ) ( dest-mac ( any | MAC_ADDR MAC_ADDR_MASK | host MAC_ADDR ) | ) ( untag-vlan | ( vlan VLAN_ID | ) ( cos COS | ) ( inner-vlan INNER_VLAN_ID | ) ( inner-cos INNER_COS | ) ) ( arp-packet ( ( arp-op-code ) ( sender-ip ( IP_ADDR IP_ADDR_MASK | any | host IP_ADDR ) | ) ( target-ip ( IP_ADDR IP_ADDR_MASK | any | host IP_ADDR ) | ) ) | packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
SEQUENCE_NUM |
The sequence number of the filter in MAC ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
any |
Any host |
- |
MAC_ADDR MAC_ADDR_MASK |
The MAC address and its wildcard bits |
MAC and wildcard in HHHH.HHHH.HHHH format |
host MAC_ADDR |
The host with a specified MAC address |
MAC address in HHHH.HHHH.HHHH format |
dest-mac |
Destination MAC address |
- |
untag-vlan |
untag-vlan |
- |
VLAN_ID |
VLAN-ID |
1-4094 |
COS |
CoS |
0-7 |
INNER_VLAN_ID |
Inner VLAN-ID |
1-4094 |
INNER_COS |
Inner CoS |
0-7 |
arp |
ARP protocol |
- |
arp-op-code |
arp-op-code |
0-65535 |
sender-ip |
sender-ip |
- |
target-ip |
target-ip |
- |
IP_ADDR IP_ADDR_MASK |
The ip address and wildcard bits |
IPv4 Address and Mask |
host IP_ADDR |
The host with a specified ip address |
IPv4 Address |
TIME-RANGE-NAME |
The time-range used by the extend IP filter |
A string with up to 40 characters |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
An auto-generated sequence number will be assigned to the filter if the sequence-num field is not presented. The auto-generated sequence number is incremented by 10 on the maximum existing sequence number in the extend IP ACL. i.e. when the maximum existing sequence number is 100, the sequence number of subsequent created MAC filter is 110.
Examples
This example shows how to create a filter in extend IP ACL to deny the packets with source MAC address 0058.3f2C.A1DF:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 1 deny src-mac host 0058.3f2C.A1DF
This example shows how to create a filter in extend IP ACL to deny all the packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 2 deny src-mac any
This example shows how to create a filter in extend IP ACL to deny the packet whose source MAC address is between the ranges specified:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 3 deny src-mac 0058.3f2C.A1DF 0058.3f2C.0000
Related Commands
no sequence-num
11.6.4. permit src-mac
Command Purpose
Use this command to create a filter for allowing packets matching the filter rule to be delivered.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) permit src-mac ( any | MAC_ADDR MAC_ADDR_MASK | host MAC_ADDR ) ( dest-mac ( any | MAC_ADDR MAC_ADDR_MASK | host MAC_ADDR ) | ) ( untag-vlan | ( vlan VLAN_ID | ) ( cos VALUE | ) ( inner-vlan INNER_VLAN_ID | ) ( inner-cos INNER_COS | ) ) ( arp-packet ( ( arp-op-code ) ( sender-ip ( IP_ADDR IP_ADDR_MASK | any | host IP_ADDR ) | ) ( target-ip ( IP_ADDR IP_ADDR_MASK | any | host IP_ADDR ) | ) ) | packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
SEQUENCE_NUM |
The sequence number of the filter in IP Extend ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
any |
Any host |
- |
MAC_ADDR MAC_ADDR_MASK |
The MAC address and its wildcard bits |
MAC and wildcard in HHHH.HHHH.HHHH format |
host MAC_ADDR |
The host with a specified MAC address |
MAC address in HHHH.HHHH.HHHH format |
dest-mac |
Destination MAC address |
- |
untag-vlan |
untag-vlan |
- |
VLAN_ID |
VLAN-ID |
1-4094 |
COS |
CoS |
0-7 |
INNER_VLAN_ID |
Inner VLAN-ID |
1-4094 |
INNER_COS |
Inner CoS |
0-7 |
arp |
ARP protocol |
- |
arp-op-code |
arp-op-code |
0-65535 |
sender-ip |
sender-ip |
- |
target-ip |
target-ip |
- |
IP_ADDR IP_ADDR_MASK |
The ip address and wildcard bits |
IPv4 Address and Mask |
host IP_ADDR |
The host with a specified ip address |
IPv4 Address |
TIME-RANGE-NAME |
The time-range used by the extend IP filter |
A string with up to 40 characters |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
An auto-generated sequence number will be assigned to the filter if the sequence-num field is not presented. The auto-generated sequence number is incremented by 10 on the maximum existing sequence number in the extend IP ACL. i.e. when the maximum existing sequence number is 105, the sequence number of subsequent created MAC filter is 115.
Examples
This example shows how to create a filter in extend IP ACL to permit the packets with source MAC address 0058.3f2C.A1DF:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-ac)# 1 permit src-mac host 0058.3f2C.A1DF
This example shows how to create a filter in extend IP ACL to permit all the packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-ac)# 2 permit src-mac any
This example shows how to create a filter in MAC ACL to permit the packets with source MAC address between the ranges specified:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 3 permit src-mac 0058.3f2C.A1DF 0058.3f2C.0000
Related Commands
no sequence-num
11.6.5. deny
Command Purpose
Use this command to discard ongoing IP packets matching the IP filter.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) deny ( PROTO_NUM | any ) ( SRC_IP SRC_IP_MASK | any | host SRC_IP ) ( DST_IP DST_IP_MASK | any | host DST_IP ) ( ip-precedence PRECEDENCE | dscp DSCP | ) ( ecn <0-3> | ) ( non-fragment | first-fragment | non-or-first-fragment | small-fragment | non-first-fragment ) ( routed-packet | ) ( options | ) ( packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
SEQUENCE_NUM |
The sequence number of the filter in IP ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
PROTO_NUM |
An IP protocol number, the range is 0 to 255 |
1, 6, 17, 47 |
any |
Any protocol |
- |
SRC_IP SRC_IP_MASK |
The source IP address and its wildcard bits |
IPv4 Address and Mask |
host SRC_IP |
The source IP address of a host |
IPv4 Address |
DST_IP DST_IP_MASK |
The destination IP address and its wildcard bits |
IPv4 Address |
host DST_IP |
The destination IP address of a host |
IPv4 Address |
PRECEDENCE |
Match packets with given precedence value |
0-7 |
DSCP |
Match packets with given dscp value |
0-63 |
ECN |
ecn value |
0-3 |
non-fragment |
Match packets with non fragment |
- |
first-fragment |
Match packets with first fragment |
- |
-non-or-first-fragment |
Match packets with non first fragment |
- |
small-fragment |
Match packets with small fragment |
- |
non-first-fragment |
Match packets with non first fragment |
- |
routed-packet |
Match routed packet |
- |
options |
Match packets with IP options |
- |
TIME-RANGE-NAME |
The time-range used by the filter |
A string with up to 40 characters |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
0-255
Default
None
Usage
If an IP address wildcard bit is provided, the IP address is logically-anded in bitwise with the reverse bits of the wildcard bits. For example, 10.10.10.0 0.0.0.255 means the addresses from 10.10.10.0 to 10.10.10.255 are matched.
An auto-generated sequence number will be assigned to the filter if the sequence-num field is not presented. The auto-generated sequence number is incremented by 10 on the maximum existing sequence number in the extend IP ACL. i.e. when the maximum existing sequence number is 100, the sequence number of subsequent created IP filter is 110.
Examples
This example shows how to create a filter in extend IP ACL to deny any IP packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 1 deny any any any
This example shows how to create a filter in extend IP ACL to deny the fragment packets with the source IP addresss 1.1.1.1:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 2 deny any host 1.1.1.1 any fragments
This example shows how to create a filter in extend IP ACL to deny any routed packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 3 deny any any any routed-packet
Related Commands
no sequence-num
11.6.6. deny tcp
Command Purpose
Use this command to reject TCP packets matching the IP filter.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) deny tcp ( SRC_IP SRC_IP_MASK | any | host SRC_IP ) ( src-port OPERATOR SRC_PORT | ) ( DST_IP DST_IP_MASK | any | host DST_IP ) ( dst-port OPERATOR DST_PORT | ) ( ip-precedence PRECEDENCE | dscp DSCP | ) ( ecn <0-3> | ) ( established | ( match-any | match-all FLAG-NAME | ) | ) ( non-fragment | first-fragment | non-or-first-fragment | small-fragment | non-first-fragment ) ( routed-packet | ) ( options | ) ( packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
SEQUENCE_NUM |
The sequence number of the filter in IP Extend ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
SRC_IP SRC_IP_MASK |
The source IP address and its wildcard bits |
IPv4 Address and Mask |
any |
Any source host |
- |
host SRC_IP |
The source IP address of a host |
IPv4 Address |
OPERATOR SRC_PORT |
Source port operator and value |
Source port, the range is 0-65535. Operator including eq (equal to), lt (less than), gt (greater than), neq (not equal to) and range |
DST_IP DST_IP_MASK |
The destination IP address and its wildcard bits |
IPv4 Address and Mask |
host DST_IP |
The destination IP address of a host |
IPv4 Address |
OPERATOR DST_PORT |
Destination port operator and value |
Destination port, the range is 0-65535. Operator including eq (equal to), lt (less than), gt (greater than), neq (not equal to) and range |
PRECEDENCE |
Match packets with given precedence value |
0-7 |
DSCP |
Match packets with given dscp value |
0-63 |
ECN |
ecn value |
0-3 |
established |
Match established connections |
- |
match-any |
Match any of the flag-name |
- |
FLAG-NAME |
Match all the flag-name, including ack, fin, psh, rst, syn and urg |
ack, fin, psh, rst, syn and urg |
non-fragment |
Match packets with non fragment |
- |
first-fragment |
Match packets with first fragment |
- |
-non-or-first-fragment |
Match packets with non first fragment |
- |
small-fragment |
Match packets with small fragment |
- |
non-first-fragment |
Match packets with non first fragment |
- |
routed-packet |
Match routed packet |
- |
options |
Match packets with IP options |
- |
TIME-RANGE-NAME |
The time-range used by the IP filter |
A string with up to 40 characters |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
The fragments will be invalid when the layer 4 information is specified (i.e. src-port).
Examples
This example shows how to create a filter in extend IP ACL to deny any TCP packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 1 deny tcp any any
This example shows how to create a filter in extend IP ACL to deny the TCP packets with the source IP address 1.1.1.1, source port 0-100:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 2 deny tcp host 1.1.1.1 src-port range 0 100 any
This example shows how to create a filter in extend IP ACL to deny any TCP packets in established TCP streams:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 3 deny tcp any any established
This example shows how to create a filer in extend IP ACL to deny the TCP ACK packets with the source IP address 10.10.10.10:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 4 deny tcp 10.10.10.0 0.0.0.0 any match-any ack
Related Commands
no sequence-num
11.6.7. deny udp
Command Purpose
Use this command to reject UDP packets matching the IP filter.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) deny udp ( SRC_IP SRC_IP_MASK | any | host SRC_IP ) ( src-port OPERATOR SRC_PORT | ) ( DST_IP DST_IP_MASK | any | host DST_IP ) ( dst-port OPERATOR DST_PORT | ) ( ip-precedence PRECEDENCE | dscp DSCP | ) ( ecn <0-3> | ) ( non-fragment | first-fragment | non-or-first-fragment | small-fragment | non-first-fragment ) ( routed-packet | ) ( options | ) ( packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
SEQUENCE_NUM |
The sequence number of the filter in IP Extend ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
SRC_IP SRC_IP_MASK |
The source IP address and its wildcard bits |
IPv4 Address and Mask |
any |
Any source host |
- |
host SRC_IP |
The source IP address of a host |
IPv4 Address |
OPERATOR SRC_PORT |
Source port operator and value |
Source port, the range is 0-65535. Operator including eq (equal to), lt (less than), gt (greater than), neq (not equal to) and range |
DST_IP DST_IP_MASK |
The destination IP address and its wildcard bits |
IPv4 Address and Mask |
host DST_IP |
The destination IP address of a host |
IPv4 Address |
OPERATOR DST_PORT |
Destination port operator and value |
Destination port, the range is 0-65535. Operator including eq (equal to), lt (less than), gt (greater than), neq (not equal to) and range |
PRECEDENCE |
Match packets with given precedence value |
0-7 |
DSCP |
Match packets with given dscp value |
0-63 |
ECN |
ecn value |
0-3 |
non-fragment |
Match packets with non fragment |
- |
first-fragment |
Match packets with first fragment |
- |
-non-or-first-fragment |
Match packets with non first fragment |
- |
small-fragment |
Match packets with small fragment |
- |
non-first-fragment |
Match packets with non first fragment |
- |
routed-packet |
Match routed packet |
- |
options |
Match packets with IP options |
- |
TIME-RANGE-NAME |
The time-range used by the IP filter |
A string with up to 40 characters |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
The fragments will be invalid when the layer 4 information is specified (i.e. src-port).
Examples
This example shows how to create a filter in IP ACL to deny any UDP packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 1 deny udp any any
This example shows how to create a filter in IP ACL to deny the UDP packets with the source IP 1.1.1.1, source port 10, and destination port less than 2000:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 2 deny udp host 1.1.1.1 src-port eq 10 any dst-port lt 2000
Related Commands
no sequence-num
11.6.8. deny icmp
Command Purpose
Use this command to reject ICMP packets matching the IP filter.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) deny icmp ( SRC_IP SRC_IP_MASK | any | host SRC_IP ) ( DST_IP DST_IP_MASK | any | host DST_IP ) ( icmp-type TYPE-NUM ( icmp-code CODE-NUM | ) | ) ( ip-precedence PRECEDENCE | dscp DSCP | ) ( ecn <0-3> | ) ( non-fragment | first-fragment | non-or-first-fragment | small-fragment | non-first-fragment ) ( routed-packet | ) ( options | ) ( packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
TYPE-NUM |
ICMP message type |
0-255 |
CODE-NUM |
ICMP message code |
0-255 |
SEQUENCE_NUM |
The sequence number of the filter in IP ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
SRC_IP SRC_IP_MASK |
The source IP address and its wildcard bits |
IPv4 Address and Mask |
any |
Any source IP address |
- |
host SRC_IP |
The source IP address of a host |
IPv4 Address |
DST_IP DST_IP_MASK |
The destination IP address and its wildcard bits |
IPv4 Address |
host DST_IP |
The destination IP address of a host |
IPv4 Address |
PRECEDENCE |
Match packets with given precedence value |
0-7 |
DSCP |
Match packets with given dscp value |
0-63 |
ECN |
ecn value |
0-3 |
non-fragment |
Match packets with non fragment |
- |
first-fragment |
Match packets with first fragment |
- |
-non-or-first-fragment |
Match packets with non first fragment |
- |
small-fragment |
Match packets with small fragment |
- |
non-first-fragment |
Match packets with non first fragment |
- |
routed-packet |
Match routed packet |
- |
options |
Match packets with IP options |
- |
TIME-RANGE-NAME |
The time-range used by the filter |
A string with up to 40 characters |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
None
Examples
This example shows how to create a filter in extend IP ACL to deny any UDP packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 1 deny udp any any
This example shows how to create a filter in extend IP ACL to deny the UDP packets with the source IP 1.1.1.1, source port 10, and destination port less than 2000:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 2 deny udp host 1.1.1.1 src-port eq 10 any dst-port lt 2000
Related Commands
no sequence-num
11.6.9. deny igmp
Command Purpose
Use this command to reject IGMP packets matching the IP filter.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) deny igmp ( SRC_IP SRC_IP_MASK | any | host SRC_IP ) ( DST_IP DST_IP_MASK | any | host DST_IP ) ( IGMP-TYPE | ) ( ip-precedence PRECEDENCE | dscp DSCP | ) ( ecn <0-3> | ) ( non-fragment | first-fragment | non-or-first-fragment | small-fragment | non-first-fragment ) ( routed-packet | ) ( options | ) ( packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
IGMP-TYPE |
IGMP type |
including dvmrp, host-query, host-report, mtrace, mtrace-response, pim, precedence, trace, v2-leave, v2-report, v3-report |
SEQUENCE_NUM |
The sequence number of the filter in IP ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
SRC_IP SRC_IP_MASK |
The source IP address and its wildcard bits |
IPv4 Address and Mask |
any |
Any source IP address |
- |
host SRC_IP |
The source IP address of a host |
- |
DST_IP DST_IP_MASK |
The destination IP address and its wildcard bits |
IPv4 Address |
host DST_IP |
The destination IP address of a host |
IPv4 Address |
PRECEDENCE |
Match packets with given precedence value |
0-7 |
DSCP |
Match packets with given dscp value |
0-63 |
ECN |
ecn value |
0-3 |
non-fragment |
Match packets with non fragment |
- |
first-fragment |
Match packets with first fragment |
- |
-non-or-first-fragment |
Match packets with non first fragment |
- |
small-fragment |
Match packets with small fragment |
- |
non-first-fragment |
Match packets with non first fragment |
- |
routed-packet |
Match routed packet |
- |
options |
Match packets with IP options |
- |
TIME-RANGE-NAME |
The time-range used by the filter |
A string with up to 40 characters |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
None
Examples
This example shows how to create a filter in extend IP ACL to deny any ICMP packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 1 deny icmp any any
This example shows how to create a filter in extend IP ACL to deny the ICMP packets with the icmp-type 3 and icmp-code 3:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 2 deny icmp any any icmp-type 3 icmp-code 3
Related Commands
no sequence-num
11.6.10. deny gre
Command Purpose
Use this command to reject GRE packets matching the IP filter.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) deny gre ( SRC_IP SRC_IP_MASK | any | host SRC_IP ) ( DST_IP DST_IP_MASK | any | host DST_IP ) ( key KEY mask KEY-MASK ) ( ip-precedence PRECEDENCE | dscp DSCP | ) ( ecn <0-3> | ) ( non-fragment | first-fragment | non-or-first-fragment | small-fragment | non-first-fragment | ) ( routed-packet | ) ( options | ) ( packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
KEY |
GRE key |
0-4294967295 |
KEY-MASK |
GRE key mask |
0-0xFFFFFFFF |
SEQUENCE_NUM |
The sequence number of the filter in IP ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
SRC_IP SRC_IP_MASK |
The source IP address and its wildcard bits |
IPv4 Address and Mask |
any |
Any source IP address |
- |
host SRC_IP |
The source IP address of a host |
- |
DST_IP DST_IP_MASK |
The destination IP address and its wildcard bits |
IPv4 Address |
host DST_IP |
The destination IP address of a host |
IPv4 Address |
PRECEDENCE |
Match packets with given precedence value |
0-7 |
DSCP |
Match packets with given dscp value |
0-63 |
ECN |
ecn value |
0-3 |
non-fragment |
Match packets with non fragment |
- |
first-fragment |
Match packets with first fragment |
- |
-non-or-first-fragment |
Match packets with non first fragment |
- |
small-fragment |
Match packets with small fragment |
- |
non-first-fragment |
Match packets with non first fragment |
- |
routed-packet |
Match routed packet |
- |
options |
Match packets with IP options |
- |
TIME-RANGE-NAME |
The time-range used by the filter |
A string with up to 40 characters |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
This type of filter is mostly used to reject GRE packets.
Examples
This example shows how to create a filter in extend IP ACL to deny any IGMP packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 1 deny igmp any any
This example shows how to create a filter in extend IP ACL to deny the IGMP packets with the source IP address 1.1.1.1, any destination IP address and the igmp-type pim:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 2 deny igmp host 1.1.1.1 any pim
Related Commands
no sequence-num
11.6.11. deny nvgre
Command Purpose
Use this command to reject NVGRE packets matching the IP filter.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) deny nvgre ( SRC_IP SRC_IP_MASK | any | host SRC_IP ) ( DST_IP DST_IP_MASK | any | host DST_IP ) ( vsid VSID mask VSID-MASK ) ( ip-precedence PRECEDENCE | dscp DSCP | ) ( ecn <0-3> | ) ( non-fragment | first-fragment | non-or-first-fragment | small-fragment | non-first-fragment | ) ( routed-packet | ) ( options | ) ( packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
VSID |
NVGRE vsid |
0-16777215 |
VSID-MASK |
NVGRE vsid mask |
0-0xFFFFFF |
SEQUENCE_NUM |
The sequence number of the filter in IP ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
SRC_IP SRC_IP_MASK |
The source IP address and its wildcard bits |
IPv4 Address and Mask |
any |
Any source IP address |
- |
host SRC_IP |
The source IP address of a host |
- |
DST_IP DST_IP_MASK |
The destination IP address and its wildcard bits |
IPv4 Address |
host DST_IP |
The destination IP address of a host |
IPv4 Address |
PRECEDENCE |
Match packets with given precedence value |
0-7 |
DSCP |
Match packets with given dscp value |
0-63 |
ECN |
ecn value |
0-3 |
non-fragment |
Match packets with non fragment |
- |
first-fragment |
Match packets with first fragment |
- |
-non-or-first-fragment |
Match packets with non first fragment |
- |
small-fragment |
Match packets with small fragment |
- |
non-first-fragment |
Match packets with non first fragment |
- |
routed-packet |
Match routed packet |
- |
options |
Match packets with IP options |
- |
TIME-RANGE-NAME |
The time-range used by the filter |
A string with up to 40 characters |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
This type of filter is mostly used to reject NVGRE packets.
Examples
This example shows how to create a filter in extend IP ACL to deny any GRE packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 1 deny gre any any key 0 mask 0
This example shows how to create a filter in extend IP ACL to deny the GRE packets with the source IP address 1.1.1.1, any destination IP address and the gre key is 10:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 2 deny gre host 1.1.1.1 any key 10 mask 0xffffffff
Related Commands
no sequence-num
11.6.12. permit
Command Purpose
Use this command to permit packets matching the IP filter.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) permit ( PROTO_NUM | any ) ( SRC_IP SRC_IP_MASK | any | host SRC_IP ) ( DST_IP DST_IP_MASK | any | host DST_IP ) ( ip-precedence PRECEDENCE | dscp DSCP | ) ( ecn <0-3> | ) ( non-fragment | first-fragment | non-or-first-fragment | small-fragment | non-first-fragment ) ( routed-packet | ) ( options | ) ( packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
SEQUENCE_NUM |
The sequence number of the filter in IP ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
PROTO_NUM |
An IP protocol number, the range is 0 to 255 |
0-255 |
any |
Any protocol |
- |
SRC_IP SRC_IP_MASK |
The source IP address and its wildcard bits |
IPv4 Address and Mask |
host SRC_IP |
The source IP address of a host |
- |
DST_IP DST_IP_MASK |
The destination IP address and its wildcard bits |
IPv4 Address |
host DST_IP |
The destination IP address of a host |
IPv4 Address |
PRECEDENCE |
Match packets with given precedence value |
0-7 |
DSCP |
Match packets with given dscp value |
0-63 |
ECN |
ecn value |
0-3 |
non-fragment |
Match packets with non fragment |
- |
first-fragment |
Match packets with first fragment |
- |
-non-or-first-fragment |
Match packets with non first fragment |
- |
small-fragment |
Match packets with small fragment |
- |
non-first-fragment |
Match packets with non first fragment |
- |
routed-packet |
Match routed packet |
- |
options |
Match packets with IP options |
- |
TIME-RANGE-NAME |
The time-range used by the filter |
A string with up to 40 characters |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
If an IP address wildcard bit is provided, the IP address is logically-anded in bitwise with the reverse bits of the wildcard bits. For example, 10.10.10.0 0.0.0.255 means the addresses from 10.10.10.0 to 10.10.10.255 are matched.
An auto-generated sequence number will be assigned to the filter if the sequence-num field is not presented. The auto-generated sequence number is incremented by 10 on the maximum existing sequence number in the extend IP ACL. i.e. when the maximum existing sequence number is 105, the sequence number of subsequent created IP filter is 115.
Examples
This example shows how to create a filter in extend IP ACL to deny any NVGRE packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 1 deny nvgre any any vsid 0 mask 0
This example shows how to create a filter in extend IP ACL to deny the NVGRE packets with the source IP address 1.1.1.1, any destination IP address and the nvgre vsid is 10:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 2 deny gre host 1.1.1.1 any vsid 10 mask 0xffffff
This example shows how to create a filter in extend IP ACL to permit any routed packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 30 permit any any any routed-packet
Related Commands
no sequence-num
11.6.13. permit tcp
Command Purpose
Use this command to permit TCP packets matching the IP filter.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) permit tcp ( SRC_IP SRC_IP_MASK | any | host SRC_IP ) ( src-port OPERATOR SRC_PORT | ) ( DST_IP DST_IP_MASK | any | host DST_IP ) ( dst-port OPERATOR DST_PORT | ) ( ip-precedence PRECEDENCE | dscp DSCP | ) ( ecn <0-3> | ) ( established | ( match-any | match-all FLAG-NAME | ) | ) ( non-fragment | first-fragment | non-or-first-fragment | small-fragment | non-first-fragment ) ( routed-packet | ) ( options | ) ( packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
SEQUENCE_NUM |
The sequence number of the filter in IP Extend ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
SRC_IP SRC_IP_MASK |
The source IP address and its wildcard bits |
IPv4 Address and Mask |
any |
Any source host |
- |
host SRC_IP |
The source IP address of a host |
IPv4 Address |
OPERATOR SRC_PORT |
Source port operator and value |
Source port, the range is 0-65535. Operator including eq (equal to), lt (less than), gt (greater than), neq (not equal to) and range |
DST_IP DST_IP_MASK |
The destination IP address and its wildcard bits |
IPv4 Address and Mask |
host DST_IP |
The destination IP address of a host |
IPv4 Address |
OPERATOR DST_PORT |
Destination port operator and value |
Destination port, the range is 0-65535. Operator including eq (equal to), lt (less than), gt (greater than), neq (not equal to) and range |
PRECEDENCE |
Match packets with given precedence value |
0-7 |
DSCP |
Match packets with given dscp value |
0-63 |
ECN |
ecn value |
0-3 |
established |
Match established connections |
- |
match-any |
Match any of the flag-name |
- |
FLAG-NAME |
Match all the flag-name, including ack, fin, psh, rst, syn and urg |
ack, fin, psh, rst, syn and urg |
non-fragment |
Match packets with non fragment |
- |
first-fragment |
Match packets with first fragment |
- |
-non-or-first-fragment |
Match packets with non first fragment |
- |
small-fragment |
Match packets with small fragment |
- |
non-first-fragment |
Match packets with non first fragment |
- |
routed-packet |
Match routed packet |
- |
options |
Match packets with IP options |
- |
TIME-RANGE-NAME |
The time-range used by the IP filter |
- |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
The fragments will be invalid when the layer 4 information is specified (i.e. src-port).
Examples
This example shows how to create a filter in extend IP ACL to permit any TCP packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 10 permit tcp any any
This example shows how to create a filter in extend IP ACL to permit the TCP packets with the source IP address 1.1.1.1, and source port ranges from 0 to 100:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 20 permit tcp host 1.1.1.1 src-port range 0 100 any
This example shows how to create a filter in extend IP ACL to permit any TCP packets in established TCP streams:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 30 permit tcp any any established
This example shows how to create a filter in extend IP ACL to permit the TCP ACK packets with the source IP address 10.10.10.0:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 4 permit tcp 10.10.10.0 0.0.0.0 any match-any ack
Related Commands
no sequence-num
11.6.14. permit udp
Command Purpose
Use this command to permit UDP packets when the packets match this access-list.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) permit udp ( SRC_IP SRC_IP_MASK | any | host SRC_IP ) ( src-port OPERATOR SRC_PORT | ) ( DST_IP DST_IP_MASK | any | host DST_IP ) ( dst-port OPERATOR DST_PORT | ) ( ip-precedence PRECEDENCE | dscp DSCP | ) ( ecn <0-3> | ) ( non-fragment | first-fragment | non-or-first-fragment | small-fragment | non-first-fragment ) ( routed-packet | ) ( options | ) ( packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
SEQUENCE_NUM |
The sequence number of the filter in IP Extend ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
SRC_IP SRC_IP_MASK |
The source IP address and its wildcard bits |
IPv4 Address and Mask |
any |
Any source host |
- |
host SRC_IP |
The source IP address of a host |
IPv4 Address |
OPERATOR SRC_PORT |
Source port operator and value |
Source port, the range is 0-65535. Operator including eq (equal to), lt (less than), gt (greater than), neq (not equal to) and range |
DST_IP DST_IP_MASK |
The destination IP address and its wildcard bits |
IPv4 Address and Mask |
host DST_IP |
The destination IP address of a host |
IPv4 Address |
OPERATOR DST_PORT |
Destination port operator and value |
Destination port, the range is 0-65535. Operator including eq (equal to), lt (less than), gt (greater than), neq (not equal to) and range |
PRECEDENCE |
Match packets with given precedence value |
0-7 |
DSCP |
Match packets with given dscp value |
0-63 |
ECN |
ecn value |
0-3 |
non-fragment |
Match packets with non fragment |
- |
first-fragment |
Match packets with first fragment |
- |
-non-or-first-fragment |
Match packets with non first fragment |
- |
small-fragment |
Match packets with small fragment |
- |
non-first-fragment |
Match packets with non first fragment |
- |
routed-packet |
Match routed packet |
- |
options |
Match packets with IP options |
- |
TIME-RANGE-NAME |
The time-range used by the IP filter |
- |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
The fragments will be invalid when the layer 4 information is specified (i.e. src-port).
Examples
This example shows how to create a filter in extend IP ACL to deny any UDP packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 1 permit udp any any
This example shows how to create a filter in extend IP ACL to deny the UDP packets with the source IP address 1.1.1.1, source port 10, and destination port less than 2000:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 2 permit udp host 1.1.1.1 src-port eq 10 any dst-port lt 2000
Related Commands
no sequence-num
11.6.15. permit icmp
Command Purpose
Use this command to permit ICMP packets when the packets match this access-list.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) permit icmp ( SRC_IP SRC_IP_MASK | any | host SRC_IP ) ( DST_IP DST_IP_MASK | any | host DST_IP ) ( icmp-type TYPE-NUM ( icmp-code CODE-NUM | ) | ) ( ip-precedence PRECEDENCE | dscp DSCP | ) ( ecn <0-3> | ) ( non-fragment | first-fragment | non-or-first-fragment | small-fragment | non-first-fragment ) ( routed-packet | ) ( options | ) ( packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
icmp-type TYPE-NUM |
ICMP message type |
0-255 |
icmp-code CODE-NUM |
ICMP message code |
0-255 |
SEQUENCE_NUM |
The sequence number of the filter in IP ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
SRC_IP SRC_IP_MASK |
The source IP address and its wildcard bits |
IPv4 Address and Mask |
any |
Any source IP address |
- |
host SRC_IP |
The source IP address of a host |
- |
DST_IP DST_IP_MASK |
The destination IP address and its wildcard bits |
IPv4 Address |
host DST_IP |
The destination IP address of a host |
IPv4 Address |
PRECEDENCE |
Match packets with given precedence value |
0-7 |
DSCP |
Match packets with given dscp value |
0-63 |
ECN |
ecn value |
0-3 |
non-fragment |
Match packets with non fragment |
- |
first-fragment |
Match packets with first fragment |
- |
-non-or-first-fragment |
Match packets with non first fragment |
- |
small-fragment |
Match packets with small fragment |
- |
non-first-fragment |
Match packets with non first fragment |
- |
routed-packet |
Match routed packet |
- |
options |
Match packets with IP options |
- |
TIME-RANGE-NAME |
The time-range used by the filter |
A string with up to 40 characters |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
None
Examples
This example shows how to create a filter in extend IP ACL to permit any ICMP packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 1 permit icmp any any
This example shows how to create a filter in extend IP ACL to permit the ICMP packets with the icmp-type 3 and icmp-code 3:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 2 permit icmp any any icmp-type 3 icmp-code 3
Related Commands
None
11.6.16. permit igmp
Command Purpose
Use this command to permit IGMP packets matching the IP filter.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) permit igmp ( SRC_IP SRC_IP_MASK | any | host SRC_IP ) ( DST_IP DST_IP_MASK | any | host DST_IP ) ( IGMP-TYPE | ) ( ip-precedence PRECEDENCE | dscp DSCP | ) ( ecn <0-3> | ) ( non-fragment | first-fragment | non-or-first-fragment | small-fragment | non-first-fragment ) ( routed-packet | ) ( options | ) ( packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
IGMP-TYPE |
IGMP type |
including dvmrp, host-query, host-report, mtrace, mtrace-response, pim, precedence, trace, v2-leave, v2-report, v3-report |
SEQUENCE_NUM |
The sequence number of the filter in IP ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
PROTO_NUM |
An IP protocol number, the range is 0 to 255 |
0-255 |
any |
Any protocol |
- |
SRC_IP SRC_IP_MASK |
The source IP address and its wildcard bits |
IPv4 Address and Mask |
DST_IP DST_IP_MASK |
The destination IP address and its wildcard bits |
IPv4 Address |
host DST_IP |
The destination IP address of a host |
IPv4 Address |
PRECEDENCE |
Match packets with given precedence value |
0-7 |
DSCP |
Match packets with given dscp value |
0-63 |
ECN |
ecn value |
0-3 |
non-fragment |
Match packets with non fragment |
- |
first-fragment |
Match packets with first fragment |
- |
-non-or-first-fragment |
Match packets with non first fragment |
- |
small-fragment |
Match packets with small fragment |
- |
non-first-fragment |
Match packets with non first fragment |
- |
routed-packet |
Match routed packet |
- |
options |
Match packets with IP options |
- |
TIME-RANGE-NAME |
The time-range used by the filter |
A string with up to 40 characters |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
None
Examples
This example shows how to create a filter in extend IP ACL to permit any IGMP packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 1 permit igmp any any
This example shows how to create a filter in extend IP ACL to permit the IGMP packets with the source IP address 1.1.1.1, any destination IP address and the igmp-type pim:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# 2 permit igmp host 1.1.1.1 any pim
Related Commands
no sequence-num
11.6.17. permit gre
Command Purpose
Use this command to permit GRE packets matching the IP filter.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) permit gre ( SRC_IP SRC_IP_MASK | any | host SRC_IP ) ( DST_IP DST_IP_MASK | any | host DST_IP ) ( key KEY mask KEY-MASK ) ( ip-precedence PRECEDENCE | dscp DSCP | ) ( ecn <0-3> | ) ( non-fragment | first-fragment | non-or-first-fragment | small-fragment | non-first-fragment | ) ( routed-packet | ) ( options | ) ( packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
KEY |
GRE key |
0-4294967295 |
KEY-MASK |
GRE key mask |
0-0xFFFFFFFF |
SEQUENCE_NUM |
The sequence number of the filter in IP ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
SRC_IP SRC_IP_MASK |
The source IP address and its wildcard bits |
IPv4 Address and Mask |
any |
Any source IP address |
- |
host SRC_IP |
The source IP address of a host |
IPv4 Address |
DST_IP DST_IP_MASK |
The destination IP address and its wildcard bits |
IPv4 Address |
host DST_IP |
The destination IP address of a host |
IPv4 Address |
PRECEDENCE |
Match packets with given precedence value |
0-7 |
DSCP |
Match packets with given dscp value |
0-63 |
ECN |
ecn value |
0-3 |
non-fragment |
Match packets with non fragment |
- |
first-fragment |
Match packets with first fragment |
- |
-non-or-first-fragment |
Match packets with non first fragment |
- |
small-fragment |
Match packets with small fragment |
- |
non-first-fragment |
Match packets with non first fragment |
- |
routed-packet |
Match routed packet |
- |
options |
Match packets with IP options |
- |
TIME-RANGE-NAME |
The time-range used by the filter |
A string with up to 40 characters |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
This type of filter is mostly used to permit GRE packets.
Examples
This example shows how to create a filter in extend IP ACL to permit any GRE packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 1 permit gre any any key 0 mask 0
This example shows how to create a filter in extend IP ACL to permit the GRE packets with the source IP address 1.1.1.1, any destination IP address and the gre key is 10:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 2 permit gre host 1.1.1.1 any key 10 mask 0xffffffff
Related Commands
no sequence-num
11.6.18. permit nvgre
Command Purpose
Use this command to permit NVGRE packets matching the IP filter.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
( SEQUENCE_NUM | ) permit nvgre ( SRC_IP SRC_IP_MASK | any | host SRC_IP ) ( DST_IP DST_IP_MASK | any | host DST_IP ) ( vsid VSID mask VSID-MASK ) ( ip-precedence PRECEDENCE | dscp DSCP | ) ( ecn <0-3> | ) ( non-fragment | first-fragment | non-or-first-fragment | small-fragment | non-first-fragment | ) ( routed-packet | ) ( options | ) ( packet-length OPERATOR LENGTH | ) ( time-range TIME-RANGE-NAME | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
VSID |
NVGRE vsid |
0-16777215 |
VSID-MASK |
NVGRE vsid mask |
0-0xFFFFFF |
SEQUENCE_NUM |
The sequence number of the filter in IP ACL. An auto-generated sequence number will be assigned to the filter if this field is not presented. |
1-131071 |
SRC_IP SRC_IP_MASK |
The source IP address and its wildcard bits |
IPv4 Address and Mask |
any |
Any source IP address |
- |
host SRC_IP |
The source IP address of a host |
- |
DST_IP DST_IP_MASK |
The destination IP address and its wildcard bits |
IPv4 Address |
host DST_IP |
The destination IP address of a host |
IPv4 Address |
PRECEDENCE |
Match packets with given precedence value |
0-7 |
DSCP |
Match packets with given dscp value |
0-63 |
ECN |
ecn value |
0-3 |
non-fragment |
Match packets with non fragment |
- |
first-fragment |
Match packets with first fragment |
- |
-non-or-first-fragment |
Match packets with non first fragment |
- |
small-fragment |
Match packets with small fragment |
- |
non-first-fragment |
Match packets with non first fragment |
- |
routed-packet |
Match routed packet |
- |
options |
Match packets with IP options |
- |
TIME-RANGE-NAME |
The time-range used by the filter |
A string with up to 40 characters |
OPERATOR |
Packet length,operator including eq (equal to), lt (less than), gt (greater than), and range |
eq (equal to), lt (less than), gt (greater than), and range |
LENGTH |
The length value |
64-16382 |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
This type of filter is mostly used to permit NVGRE packets.
Examples
This example shows how to create a filter in extend IP ACL to permit any NVGRE packets:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 1 permit nvgre any any vsid 0 mask 0
This example shows how to create a filter in extend IP ACL to permit the NVGRE packets with the source IP address 1.1.1.1, any destination IP address and the nvgre vsid is 10:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acl)# 2 permit gre host 1.1.1.1 any vsid 10 mask 0xffffff
Related Commands
no sequence-num
11.6.19. remark
Command Purpose
Use this command to add remarks for the extend IP ACL.
To remove remarks from the extend IP ACL, use the no form of this command.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
remark REMARK
no remark
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
REMARK |
The remarks of the extend IP ACL |
A string with up to 100 characters |
Command Mode
Extend IP ACL Configuration
Default
None
Usage
The remark is up to 100 characters.
Examples
This example shows how to add a remark to describe the extend IP ACL:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# remark remard0flist1
This example shows how to remove the remark from the extend IP ACL:
Switch# configure terminal
Switch(config)# ip access-list list_ipv4_1 extend
Switch(config-ex-ip-acll)# no remark
Related Commands
None
11.6.20. show access-list ip extend
Command Purpose
Use this command to show the information of extend IP ACL.
Prerequisites
Platform |
Software |
License |
Comments |
---|---|---|---|
AQ-N3000 |
7.0 |
Base |
|
AQ-N5000 |
7.0 |
Base |
|
AQ-N6000 |
7.0 |
Base |
Command Syntax
show access-list ip ( ACL_NAME extend | )
Parameter |
Parameter Description |
Parameter Value |
---|---|---|
ACL_NAME extend |
The name of the extend IP ACL |
A string with up to 40 characters |
Command Mode
Privileged EXEC
Default
None
Usage
None
Examples
This example shows how to show the information of extend IP ACL:
Switch# show access-list ip
ip access-list ex_ip_list_ipv4_1 extend
2 permit tcp host 1.1.1.1 any
3 deny icmp any any
12 permit tcp any any
Related Commands
ip access-list extend