To create an IPv4 access control list(ACL) rule thta permits traffic
matching its conditions, use the
permitcommand. To remove a rule, use the
no form of this command.
CSCsy01403: Make sure there are no extra spaces in the syntax diagram
block following
General Syntax: [sequence-number
] permitprotocolsourcedestinationQA Test: CSCsv22488 The following groupchose should
appear with square brackets only
[ dscpdscp | QA test
CSCsz89741: check that a space appears after thisprecedence ]
[QA Test:
CSCsx24477] This synblk must appear on a different lineprotocolsourcedestination
QA Test Sprint 9 CSCtc25038 and CSCsw43905 There should be a pipe
separator between this sentence |
| and this sentence. There should also be a single space before the pipe and after the pipe
QA Test Sprint 9: Open this command in firefox and check that the fonts for the command syntax is the same size.
Sequence number of the
permit command, which causes the device to
insert the command in that numbered position in the access list. Sequence
numbers maintain the order of rules within an ACL.
A sequence number can be any integer between 1 and 4294967295.
By default, the first rule in an ACL has a sequence number of
10.
If you do not specify a sequence number, the device adds the
rule to the end of the ACL and assigns a sequence number that is 10 greater
than the sequence number of the preceding rule.
Use the
resequence command to reassign sequence
number to rules.
protocol
Name or number of the protocol of packets that the rule
matches. Valid numbers are from 0 to 255. Valid protocol names are the
following keywords:
icmp
Specifies that the rule applies to ICMP traffic only.
When you use this keyword, the
icmp-message argument is
available, in addition to the keywords that are available for all valid values
of the
protocol ardument.
ip
Specifies that the rule applies to all IPv4 traffic.
When you use this keyword, only the other keywords and arguments that apply to
all IPv4 protocols are available. They include the following:
dscp
fragments
log
precedence
time-range
tcp
Specifies that the rule applies to TCP traffic only.
When you use this keyword, the
flags and
operation argumnets and the
portgroup and
established keywords are
available, in addition to the keywords that are available for all valid values
of the
protocol argument.
udp
Specifies that the rule applies to UDP traffic only.
When you use this keyword, the
operator argument and the
portgroup keyword are
available, in addition to the keywords that are available for all valid values
of the
portocol argument.
source
Source IPv4 addresses that the rule matches. For details about
the methods that you can use to specify this argument, see "Source and
Destination" in the "Usage Guidelines" section.
destination
Destination IPv4 addresses that the rule matches. For details
about the methods that you can use to specify this argument, see "Source and
Destination" in the "Usage Guidelines" section.
dscpdscp
(Optional) Specifies that the rule matches only those packets
with the specified 6-bit differentiated services value in the DSCP field of the
IP header. The dscp argument can be one of the following numbers or keywords:
0-63
The decimal equivalent of the 6 bits of the DSCP field.
For example, if you specify 10, the rule matches only those packets that have
the following bits in the DSCP field: 001010.
af12
AF class 1, medium drop probabilty (001100)
af13
AF class 1, high drop probabilty (001100)
af21
AF class 2, low drop probabilty (001100)
af22
AF class 2, medium drop probabilty (001100)
af23
AF class 2, high drop probabilty (001100)
af31
AF class 3, low drop probabilty (001100)
af32
AF class 3, medium drop probabilty (001100)
af33
AF class 3, high drop probabilty (001100)
af41
AF class 4, low drop probabilty (001100)
af42
AF class 4, medium drop probabilty (001100)
af43
AF class 4, high drop probabilty (001100)
cs1
Class-selector (CS) 1, precedence 1 (001000)
cs2
Class-selector (CS) 2 (001000)
cs3
Class-selector (CS) 3 (001000)
cs4
Class-selector (CS) 4(001000)
cs5
Class-selector (CS) 5 (001000)
cs6
Class-selector (CS) 6(001000)
cs7
Class-selector (CS) 7(001000)
default
Default DSCP value (000000)
if
Expedited Forwarding (101110)
precedenceprecedence
(Optional) Specifies that the rule matches only packets that
have an IP Precedence field with the value specified by the precedence
argument. The precedence argument can be a number or a keyword, as follows:
0-7
Decimal equivalent of the 3 bits of the IP Precedence
field. For example, if you specify 3, the rule matches only packets that have
the following bits in the DSCP field: 011.
critical
Precedence 5 (101)
flash
Precedence 3(011)
flash-override
Precedence 4(100)
immediate
Precedence 2 (010)
internet
Precedence 6 (110)
network
Precedence 7 (111)
priority
Precedence 1 (001)
routine
Precedence 0 (000)
fragments
(Optional) Specifies that the rule matches only those packets
that are noninitial fragments. You cannot specify this keyword in the same rule
that you specify Layer 4 options, such as a TCP port number, because the
information that the devices requires to evaluate those options is contained
only in initial fragments.
log
(Optional) Specifies that the device generates an
informational logging message about each packet that matches the rule. The
message includes the following information:
Whether the protocol was TCP, UDP, ICMP or a number
Source and destination addresses
Source and destination port numbers, if applicable
tine-rangetime-range
(Optional) Specifies the time range that applies to this rule.
Use the
time-range command to a time range.
icmp-message
(ICMP only: Optional) ICMP message type that the rule matches.
This argument can be an integer from 0 to 255 or one of the keywords listed
under "ICMP Message Types" in the "Usage Guidelines" section.
igmp-message
(IGMP only: Optional) IGMP message type that the rule matches.
The igmp-message argument can be the IGMP message number, which is an integer
from 0 to 15. It can also be one of the following keywords:
dvmrp
Distance Vector Multicast Routing Protocol
host-query
Host query
host-report
Host report
pim
Protocol Independent Multicast
trace
Multicast trace
operatorport
(Optional; TCP and UDP only) Rule matches only packets that
are from a source port or sent to a destination port that satisfies the
conditions of the operator and port arguments. Whether these arguments apply to
a source port or a destination port depends upon whether you specify them after
the source argument or after the destination argument.
The port argument can be the name or the number of a TCP or
UDP port. Valid numbers are integers from 0 to 65535. For listings of valid
port names, see "TCP Port Names" and "UDP Port Names" in the "Usage Guidelines"
section.
A second port argument is required only when the operator
argument is a range.
The operator argument must be one of the following keywords:
eq
Matches only if the port in the packet is equal to the
port argument.
gt
Matches only if the port in the packet is greater than
the port argument.
lt
Matches only if the port in the packet is less than the
port argument.
neq
Matches only if the port in the packet is not equal to
the port argument.
range
Requires two port arguments and matches only if the port
in the packet is equal to or greater than the first port argument and equal to
or less than the second port argument.
portgroupportgroup
(Optional; TCP and UDP only) Specifies that the rule matches
only packets that are from a source port or to a destination port that is a
member of the IP port object group specified by the portgroup argument, which
can be up to 64 alphanumeric, case-sensitive characters. Whether the IP port
object group applies to a source port or a destination port depends upon
whether you specify it after the source argument or after the destination
argument.
Use the
object-group ip port command to create and
change IP port object objects
(TCP only; Optional) TCP control bit flags that the rule
matches. The value of the flags argument must be one or more of the following
keywords:
ack
fin
psh
rst
syn
urg
established
(TCP only; Optional) Specifies that the rule matches only
packets that belong to an established TCP connection. The device considers TCP
packets with the ACK or RST bits set to belong to an established connection.
Command Default
A Newly created IPv4 ACL contains no rules
If yo do not specify a sequence number, the device assigns to the rule
a sequence number that is greater than 10 greater than the last rule in the ACL
Command Modes
IPv4 ACL configuration
Command History
Release
Modification
4.0(1)
This Command was introduced
Usage Guidelines
QA Test Sprint 9 : Test That this Cross chapter xref link works. Check offline PDF. Run the publication WF and check the html and PDF.create vnic-egress-policy
When the device applies an IPv4 ACL to a packet, it evaluates the
packet with every rule in the ACL. The device enforces the first rule that has
conditions that are satisfied by the packet. When the conditions of more than
one rule are satisfied, the device enforces the rule with the lowest sequence
number. This command does not require a license
You can specify the
sourceand
destination arguments in one of several ways. In
each rule, the method you use to specify one of these arguments does not affect
how you specify the other. When you configure a rule, use the following methods
to specify the
source and
destinationarguments:
IP address group object—
You can use an IPv4 address group object to specify a source or
destination argument. Use the
object-group ip address command to create and
change IPv4 address group objects. The syntax is as follows: QA: CSCsz86893.
These sep elements after addrgroup should render with a space (2 spaces). This
is outside of a syntaxdiagram.
addrgroupspaceaddress-group-name
The following example shows how to use an IPv4 address object
group named lab-gateway-svrs to specify the destination argument:
switch(config-acl)# permit ip any addrgroup lab-gateway-svrs
Address and network wildcard
You can use an IPv4 address followed by a network wildcard to
specify a host or a network as a source or destination. The syntax is as
follows:IPv4-addressnetwork-willdcard
The following example shows how to specify the source argument
with the IPv4 address and VLSM for the 192.168.67.0 subnet
switch(config-acl)#
The icmp-message argument can be the ICMP message number, which is an
integer from 0 to 255. It can also be one of the following keywords:
administratively-prohibited
Administratively-prohibited
alternate-address
Alternate-address
When you specify the protocol argument as
tcp, the port argument can be a TCP port number,
which is an integer from 0 to 65535. It can also be one of the following
keywords:
bgp
Border Gateway Protocol
chargen
Character generator
cmd
Remote commands (rcmd,514)
Examples
QA Test: CSCsw88555. A Title "Examples" should be autognerated on the
left hand side over here.This example shows how to configure an IPv4 ACL named
acl-lab-01 with rules permitting all TCP and UDP traffic from the 10.23.0.0 and
192.168.37.0 networks to the 10.176.0.0 network:
his example shows how to configure an IPv4 ACL named
acl-eng-to-marketing with a rule that permits all IP traffic from an IP-address
object group named eng_workstations to an IP-address object group named
marketing_group:
QA Test Sprint 9 US195: This Related Command Section should render as a table. The Second column should contain the Shortdescription of the respective related command. Also make sure that the shortdescription text does not get concatenated to the linktext
QA Test: CSCtd06182 Check that the shortdescriptions appear on the dfescription column below. Also click on the first cross chapter link and see that it works in html and pdf chapters