monitoring only specified traffic instead all traffic on the interface. This feature is
particularly useful when looking for malicious traffic. It is available for Layer 2 and
Layer 3 ingress and egress traffic. You may specify traffic using standard or
extended access-lists. This mechanism copies all incoming or outgoing packets on
one port and forwards (mirrors) them to another port. The source port is the
monitored port (MD) and the destination port is the monitoring port (MG).
The
order
option is relevant in the context of the Policy QoS feature only. For
more information, refer to the Quality of Service chapter of the
Dell Networking OS
Configuration Guide
.
The
monitor
option is relevant in the context of flow-based monitoring only. For
more information, refer to the
Port Monitoring
.
When you use the
log
option, the CP processor logs details the packets that
match. Depending on how many packets match the log entry and at what rate, the
CP may become busy as it has to log these packets’ details.
You cannot include IP, TCP or UDP (Layer 3) filters in an ACL configured with ARP
or Ether-type (Layer 2) filters. Apply Layer 2 ACLs (ARP and Ether-type) to Layer 2
interfaces only.
NOTE: When ACL logging and byte counters are configured simultaneously,
byte counters may display an incorrect value. Configure packet counters with
logging instead.
deny icmp
To drop all or specific internet control message protocol (ICMP) messages, configure a filter.
Syntax
deny icmp {
source mask
| any | host
ip-address
} {
destination
mask
| any | host
ip-address
} [dscp] [count [byte]] [order]
[fragments][log interval minutes] [threshold-in-msgs] [count]]
[monitor]
To remove this filter, you have two choices:
• Use the
no seq
sequence-number
command, if you know the filter’s
sequence number.
• Use the
no deny icmp {
source mask
| any | host
ip-address
}
{
destination mask
| any | host
ip-address
}
command.
Parameters
source
Enter the IP address of the network or host from which the
packets were sent.
mask
Enter a network mask in /prefix format (/x) or A.B.C.D. The
mask, when specified in A.B.C.D format, may be either
contiguous or non-contiguous.
226
Access Control Lists (ACL)