Supported on all 7210 SAS platforms as described in this document
This command creates a text description stored in the configuration file for a configuration context.
The description command associates a text string with a configuration context to help identify the context in the configuration file.
The no form of this command removes any description string from the context.
Supported on all 7210 SAS platforms as described in this document
This command enables the context to configure for an IP filter policy.
IP-filter policies specify either a forward or a drop action for packets based on the specified match criteria.
The IP filter policy, sometimes referred to as an access control list (ACL), is a template that can be applied to multiple services as long as the scope of the policy is template.
Any changes made to the existing policy, using any of the sub-commands, will be applied immediately to all services where this policy is applied. For this reason, when many changes are required on an ip-filter policy,Nokia recommends that the policy be copied to a work area. That work-in-progress policy can be modified until complete and then written over the original filter policy. Use the config filter copy command to maintain policies in this manner.
By default, when an IPv4 filter policy is associated with a service entity (For example: SAP), the software attempts to allocate resources for the filter policy entries from the IPv4 resource pool. If resources unavailable in the pool, then the software fails to associate and display an error. If the user knows that resources are free in the IPv6 resource pool, then the use-ipv6-resource parameter is used to allow the user to share the entries in the resource chunks allocated for use by IPv6 128-bit resource pool, if available. If this parameter is specified then the resource for this filter policy is always allocated from the IPv6 128-bit filter resource pool.
![]() | Note: By default, IPv4 filters are created using IPv4 resources, assuming an unspecified use-ipv6-resource. If such filters are to be created using IPv6 resources, the use-ipv6-resource option needs to be specified. Ahead of the application of such a filter, the user should ensure the number of policies in the newly created policy is within the limit of available resources in the IPv6 128-bit resource pool, by considering the dump of the tools dump system-resources command. |
The no form of this command deletes the IP filter policy. A filter policy cannot be deleted until it is removed from all SAPs where it is applied.
Supported on all 7210 SAS platforms as described in this document
This command enables the context to create IPv6 filter policy. During IIPv6 filter creation, the user must specify if IPv6 addresses, both source and destination IPv6 addresses, specified in the match criteria uses complete 128-bits or uses only the upper 64 bits of the IPv6 addresses.
The no form of this command deletes the IPv6 filter policy. A filter policy cannot be deleted until it is removed from all SAPs or network ports where it is applied
128-bit addresses
Supported on all 7210 SAS platforms as described in this document
This command enables the context for a MAC filter policy.
The mac-filter policy specifies either a forward or a drop action for packets based on the specified match criteria.
The mac-filter policy, sometimes referred to as an access control list, is a template that can be applied to multiple services as long as the scope of the policy is template.
![]() | Note: A MAC filter policy cannot be applied to network ports on the 7210 SAS-K 2F6C4T and 7210 SAS-K 3SFP+ 8C. |
Any changes made to the existing policy, using any of the sub-commands, will be applied immediately to all services where this policy is applied. For this reason, when many changes are required on a mac-filter policy, Nokia recommends that the policy be copied to a work area. That work-in-progress policy can be modified until complete and then written over the original filter policy. Use the config filter copy command to maintain policies in this manner.
The no form of this command deletes the mac-filter policy. A filter policy cannot be deleted until it is removed from all SAP where it is applied.
Supported on all 7210 SAS platforms as described in this document
This command specifies the action to be applied to packets when the packets do not match the specified criteria in all of the IP filter entries of the filter.
When multiple default-action commands are entered, the last command will overwrite the previous command.
drop
Supported on all 7210 SAS platforms as described in this document
This command configures the filter policy scope as exclusive or template. If the scope of the policy is template and is applied to one or more services or network interfaces, the scope cannot be changed.
The no form of this command reverts the scope of the policy to the default.
template
Supported on all 7210 SAS platforms as described in this document
This command enables the context to create or edit an IP or MAC filter entry. Multiple entries can be created using unique entry-id numbers within the filter. The implementation exits the filter on the first match found and executes the actions in accordance with the accompanying action command. For this reason, entries must be sequenced correctly from most to least explicit.
An entry may not have any match criteria defined (in which case, everything matches) but must have the action command for it to be considered complete. Entries without the action command will be considered incomplete and therefore will be rendered inactive.
The no form of this command removes the specified entry from the IP or MAC filter. Entries removed from the IP or MAC filter are immediately removed from all services or network ports where that filter is applied.
Supported on all 7210 SAS platforms as described in this document
This command specifies to match packets with a specific IP option or a range of IP options in the first option of the IP header as an IP filter match criterion. The action keyword must be entered and a keyword specified in order for the entry to be active.
Multiple action statements entered will overwrite previous actions parameters when defined.
The no form of this command removes the specified action statement. The filter entry is considered incomplete and therefore rendered inactive without the action keyword.
Supported on all 7210 SAS platforms as described in this document
This command enables the context to enter match criteria for the filter entry. When the match criteria have been satisfied the action associated with the match criteria is executed.
If more than one match criteria (within one match statement) are configured, all criteria must be satisfied (AND function) before the action associated with the match is executed.
A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.
The no form of this command removes the match criteria for the entry-id.
Protocol ID | Protocol | Description |
1 | icmp | Internet Control Message |
2 | igmp | Internet Group Management |
4 | ip | IP in IP (encapsulation) |
6 | tcp | Transmission Control |
8 | egp | Exterior Gateway Protocol |
9 | igp | Any private interior gateway |
17 | udp | User Datagram |
27 | rdp | Reliable Data Protocol |
45 | idrp | Inter-Domain Routing Protocol |
46 | rsvp | Reservation Protocol |
80 | iso-ip | ISO Internet Protocol |
88 | eigrp | EIGRP |
89 | ospf-igp | OSPFIGP |
97 | ether-ip | Ethernet-within-IP Encapsulation |
98 | encap | Encapsulation Header |
102 | pnni | PNNI over IP |
103 | pim | Protocol Independent Multicast |
112 | vrrp | Virtual Router Redundancy Protocol |
115 | l2tp | Layer Two Tunneling Protocol |
118 | stp | Schedule Transfer Protocol |
123 | ptp | Performance Transparency Protocol |
124 | isis | ISIS over IPv4 |
126 | crtp | Combat Radio Transport Protocol |
127 | crudp | Combat Radio User Datagram |
Supported on all 7210 SAS platforms as described in this document
This command configures the action for a MAC filter entry. The action keyword must be entered for the entry to be active. Any filter entry without the action keyword will be considered incomplete and will be inactive.
If neither drop nor forward is specified, this is considered a No-Op filter entry used to explicitly set a filter entry inactive without modifying match criteria or removing the entry.
Multiple action statements entered will overwrite previous actions parameters when defined. To remove a parameter, use the no form of the action command with the specified parameter.
The no form of this command removes the specified action statement. The filter entry is considered incomplete and therefore rendered inactive without the action keyword.
Supported on all 7210 SAS platforms as described in this document
This command enables the context for entering or editing match criteria for the filter entry and specifies an Ethernet frame type for the entry. When the match criteria have been satisfied, the action associated with the match criteria is executed.
If more than one match criteria (within one match statement) are configured, then all criteria must be satisfied (AND function) before the action associated with the match will be executed.
A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.
The no form of this command removes the match criteria for the entry-id.
Supported on all 7210 SAS platforms as described in this document
This command configures a DiffServ Code Point (DSCP) name to be used as an IP filter match criterion.
The no form of this command removes the DSCP match criterion.
no dscp
Supported on all 7210 SAS platforms as described in this document
This command configures a destination IP address range to be used as an IP filter match criterion.
To match on the destination IP address, specify the address and its associated mask, e.g. 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 may also be used.
The no form of this command removes the destination IPv4 address match criterion.
none
Supported on all 7210 SAS platforms as described in this document
This command configures a destination IPv6 address range to be used as an IP filter match criterion.
To match on the destination IPv6 address, specify the address and its associated mask.
The no form of this command removes the destination IPv6 address match criterion.
none
Supported on all 7210 SAS platforms as described in this document
This command configures a destination TCP or UDP port number for an IP filter match criterion.
![]() | Note: An entry containing L4 match criteria will not match non-initial (2nd, 3rd, and so on) fragments of a fragmented packet because only the first fragment contains the L4 information. |
The no form of this command removes the destination port match criterion.
none
7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
This command allows the user to specify if the presence of the IPv6 extension header should be used to match an IPv6 packet.
The no form of this command removes the match criterion.
no eh-present
7210 SAS-Dxp, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
This command configures fragmented or non-fragmented IPv4 packets as IP filter match criteria.
![]() | Note: An entry containing L4 match criteria will not match non-initial (2nd, 3rd, and so on) fragments of a fragmented packet because only the first fragment contains the L4 information. |
The no form of this command removes the match criterion.
no fragment
7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
This command configures fragmented or non-fragmented IPv6 packets as IP filter match criteria.
![]() | Note: An entry containing L4 match criteria will not match non-initial (2nd, 3rd, and so on) fragments of a fragmented packet because only the first fragment contains the L4 information. |
The no form of this command removes the match criterion.
no fragment
Supported on all 7210 SAS platforms as described in this document
This command configures matching on the ICMP code field in the ICMP header of an IP packet as a filter match criterion.
![]() | Note: An entry containing L4 match criteria will not match non-initial (2nd, 3rd, and so on) fragments of a fragmented packet because only the first fragment contains the L4 information. |
For an IPv4 filter, this command applies only if the protocol match criterion specifies ICMP (1).
For an IPv6 filter, this command applies only if the next header match criterion specifies ipv6-icmp (58).
The no form of this command removes the criterion from the match entry.
no icmp-code
Supported on all 7210 SAS platforms as described in this document
This command configures matching on the ICMP type field in the ICMP header of an IP packet as a filter match criterion.
![]() | Note: An entry containing L4 match criteria will not match non-initial (2nd, 3rd, and so on) fragments of a fragmented packet because only the first fragment contains the L4 information. |
For an IPv4 filter, this command applies only if the protocol match criterion specifies ICMP (1).
For an IPv6 filter, this command applies only if the next header match criterion specifies ipv6-icmp (58).
The no form of this command removes the criterion from the match entry.
no icmp-type
Supported on all 7210 SAS platforms as described in this document.
This command configures matching packets that contain the option field in the IP header as an IP filter match criterion.
The no form of this command removes the checking of the option field in the IP header as a match criterion.
Supported on all 7210 SAS platforms as described in this document
This command configures a source IPv4 address range to be used as an IP filter match criterion.
To match on the source IPv4 address, specify the address and its associated mask, for example, 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 may also be used.
The no form of this command removes the source IPv4 address match criterion.
no src-ip
Supported on all 7210 SAS platforms as described in this document
This command configures a source IPv6 address range to be used as an IP filter match criterion.
To match on the source IPv6 address, specify the address and its associated mask.
If the filter is created to match 64-bit address, the IPv6 address specified for the match must contain only the first 64-bits (that is, the first four 16-bit groups of the IPv6 address).
The no form of this command removes the source IPv6 address match criterion.
no src-ip
Supported on all 7210 SAS platforms as described in this document
This command configures a source TCP or UDP port number for an IP filter match criterion.
![]() | Note: An entry containing L4 match criteria will not match non-initial (2nd, 3rd, etc) fragments of a fragmented packet since only the first fragment contains the L4 information. |
The no form of this command removes the source port match criterion.
no src-port
Supported on all 7210 SAS platforms as described in this document
This command configures matching on the ACK bit being set or reset in the control bits of the TCP header of an IP packet as an IP filter match criterion.
![]() | Note: An entry containing L4 match criteria will not match non-initial (2nd, 3rd, and so on) fragments of a fragmented packet since only the first fragment contains the L4 information. |
The no form of this command removes the criterion from the match entry.
no tcp-ack
Supported on all 7210 SAS platforms as described in this document
This command configures matching on the SYN bit being set or reset in the control bits of the TCP header of an IP packet as an IP filter match criterion.
The SYN bit is normally set when the source of the packet needs to initiate a TCP session with the specified destination IP address.
![]() | Note: An entry containing L4 match criteria will not match non-initial (2nd, 3rd, and so on) fragments of a fragmented packet since only the first fragment contains the L4 information. |
The no form of this command removes the criterion from the match entry.
no tcp-syn
Supported on all 7210 SAS platforms as described in this document
This command configures an IEEE 802.1p value or range to be used as a MAC filter match criterion.
When a frame is missing the 802.1p bits, specifying an dot1p match criterion will fail for the frame and result in a non-match for the MAC filter entry.
The no form of this command removes the criterion from the match entry.
Egress Dot1p values used for matching will correspond to the Dot1p values used for remarking.
no dot1p
Format Style | Format Syntax | Example |
Decimal | D | 4 |
Hexadecimal | 0xH | 0x4 |
Binary | 0bBBB | 0b100 |
To select a range from 4 up to 7 specify p-value of 4 and a mask of 0b100 for value and mask.
Supported on all 7210 SAS platforms as described in this document
This command configures a destination MAC address or range to be used as a MAC filter match criterion.
The no form of this command removes the destination mac address as the match criterion.
no dst-mac
This 48-bit mask can be configured using the following formats:
Format Style | Format Syntax | Example |
Decimal | DDDDDDDDDDDDDD | 281474959933440 |
Hexadecimal | 0xHHHHHHHHHHHH | 0xFFFFFF000000 |
Binary | 0bBBBBBBB...B | 0b11110000...B |
To configure so that all packets with a source MAC OUI value of 00-03-FA are subject to a match condition then the entry should be specified as: 0003FA000000 0xFFFFFF000000
Supported on all 7210 SAS platforms as described in this document
This command configures an Ethernet type II Ethertype value for use as a MAC filter match criterion.
The Ethernet type field is a two-byte field used to identify the protocol carried by the Ethernet frame. For example, 0800 is used to identify the IPv4 packets.
The Ethernet type field is used by the Ethernet version-II frames. IEEE 802.3 Ethernet frames do not use the type field.
For the 7210 SAS-D, 7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C platforms, the dataplane processes a maximum of two VLAN tags in a received packet. The Ethertype used in the MAC matching criteria for ACLs is the Ethertype that is found in the packet after processing single-tagged frames, double-tagged frames, and no-tag frames
The packet is considered to have no tags if at least one of the following criteria is true:
The packet is considered to have a single tag if at least one of the following criteria is true:
The packet is considered to have double tags if at least one of the following criteria is true:
The no form of this command removes the previously entered etype field as the match criteria.
no etype
7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
This command configures the Dot1p value to be used to match against the Dot1p value in the inner tag (the one that follows the outermost tag in the packet) of the received packet.
The no form of this command removes the previously entered Dot1p value as the match criteria.
no inner-dot1p
7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
This command configures the VLAN value to be used to match against the VLAN value in the inner tag (the one that follows the outermost tag in the packet) of the received packet.
The optional vid_mask is defaulted to 4095 (exact match) but may be specified to allow pattern matching. The masking operation is ((value & vid-mask) = = (tag & vid-mask)). A value of 6 and a mask of 7 would match all VIDs with the lower 3 bits set to 6.
The no form of this command removes the previously entered VLAN tag value as the match criteria.
no inner-tag
7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
The command configures the Dot1p value to be used to match against the Dot1p value in the outermost tag of the received packet.
The no form of this command removes the previously entered Dot1p value as the match criteria.
no outer-dot1p
7210 SAS-K 2F1C2T, 7210 SAS-K 2F6C4T, and 7210 SAS-K 3SFP+ 8C
This command configures the VLAN value to be used to match against the VLAN value in the inner tag (the one that follows the outermost tag in the packet) of the received packet.
The optional vid_mask is defaulted to 4095 (exact match) but may be specified to allow pattern matching. The masking operation is ((value & vid-mask) = = (tag & vid-mask)). A value of 6 and a mask of 7 would match all VIDs with the lower 3 bits set to 6.
The no form of this command removes the previously entered VLAN tag value as the match criteria.
no outer-tag
Supported on all 7210 SAS platforms as described in this document
This command configures a source MAC address or range to be used as a MAC filter match criterion.
The no form of this command removes the source mac as the match criteria.
no src-mac
Format Style | Format Syntax | Example |
Decimal | DDDDDDDDDDDDDD | 281474959933440 |
Hexadecimal | 0xHHHHHHHHHHHH | 0x0FFFFF000000 |
Binary | 0bBBBBBBB...B | 0b11110000...B |
To configure so that all packets with a source MAC OUI value of 00-03-FA are subject to a match condition then the entry should be specified as: 003FA000000 0xFFFFFF000000
Supported on all 7210 SAS platforms as described in this document
This command copies existing filter list entries for a specific filter ID to another filter ID. The copy command is a configuration level maintenance tool used to create new filters using existing filters. It also allows bulk modifications to an existing policy with the use of the overwrite keyword.
If overwrite is not specified, an error will occur if the destination policy ID exists.
Supported on all 7210 SAS platforms as described in this document
This command configures the filter-name attribute of a specific filter. When configured, filter-name can be used instead of filter ID to reference the specific policy in the CLI.
no filter-name
Supported on all 7210 SAS platforms as described in this document
This command renumbers existing MAC or IP filter entries to properly sequence filter entries. This may be required in some cases since the OS exits when the first match is found and executes the actions according to the accompanying action command. This requires that entries be sequenced correctly from most to least explicit.
Supported on all 7210 SAS platforms as described in this document
This command displays IP filter information.
The following outputs are examples of IP filter information, and the associated tables describe the output fields.
Label | Description |
Filter Id | The IP filter ID. |
Scope | Template — The filter policy is of type template. |
Exclusive — The filter policy is of type exclusive. | |
Applied | No — The filter policy ID has not been applied. |
Yes — The filter policy ID has been applied. | |
Description | The IP filter policy description. |
Label | Description |
Filter Id | The IP filter policy ID. |
Scope | Template — The filter policy is of type template. |
Exclusive — The filter policy is of type exclusive. | |
Entries | The number of entries configured in this filter ID. |
Description | The IP filter policy description. |
Applied | No — The filter policy ID has not been applied. |
Yes — The filter policy ID has been applied. | |
Def. Action | Forward — The default action for the filter ID for packets that do not match the filter entries is to forward. |
Drop — The default action for the filter ID for packets that do not match the filter entries is to drop. | |
Filter Match Criteria | IP — Indicates the filter is an IP filter policy. |
Entry | The filter ID filter entry ID. If the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified. |
ICMP Type | The ICMP type match criterion. Undefined indicates no ICMP type specified. |
Fragment | False — Configures a match on all non-fragmented IP packets. |
True — Configures a match on all fragmented IP packets. | |
Off — Fragments are not a matching criteria. All fragments and non-fragments implicitly match. | |
TCP-syn | False — Configures a match on packets with the SYN flag set to false. |
True — Configured a match on packets with the SYN flag set to true. | |
Off — The state of the TCP SYN flag is not considered as part of the match criteria. | |
Match action | Default — The filter does not have an explicit forward or drop match action specified. If the filter entry ID indicates the entry is Inactive, the filter entry is incomplete, no action was specified. |
Drop — Drop packets matching the filter entry. | |
Forward — The explicit action to perform is forwarding of the packet. | |
Ing. Matches | The number of ingress filter matches or hits for the filter entry. |
Src. Port | The source TCP or UDP port number. |
Dest. Port | The destination TCP or UDP port number. |
Dscp | The DiffServ Code Point (DSCP) name. |
ICMP Code | The ICMP code field in the ICMP header of an IP packet. |
Option-present | Off — Specifies not to search for packets that contain the option field or have an option field of zero. |
On — Matches packets that contain the option field or have an option field of zero be used as IP filter match criteria. | |
TCP-ack | False — Configures a match on packets with the ACK flag set to false. |
True — Configures a match on packets with the ACK flag set to true. | |
Off — The state of the TCP ACK flag is not considered as part of the match criteria. as part of the match criteria. | |
Egr. Matches | The number of egress filter matches or hits for the filter entry. |
Label | Description |
Filter Id | The IP filter policy ID. |
Scope | Template — The filter policy is of type Template. |
Exclusive — The filter policy is of type Exclusive. | |
Entries | The number of entries configured in this filter ID. |
Applied | No — The filter policy ID has not been applied. |
Yes — The filter policy ID has been applied. | |
Def. Action | Forward — The default action for the filter ID for packets that do not match the filter entries is to forward. |
Drop — The default action for the filter ID for packets that do not match the filter entries is to drop. | |
Service Id | The service ID on which the filter policy ID is applied. |
SAP | The Service Access Point on which the filter policy ID is applied. |
(Ingress) | The filter policy ID is applied as an ingress filter policy on the interface. |
(Egress) | The filter policy ID is applied as an egress filter policy on the interface. |
Type | The type of service of the service ID. |
Label | Description |
IP Filter Filter Id | The IP filter policy ID. |
Scope | Template — The filter policy is of type Template. |
Exclusive — The filter policy is of type Exclusive. | |
Applied | No — The filter policy ID has not been applied. |
Yes — The filter policy ID has been applied. | |
Def. Action | Forward — The default action for the filter ID for packets that do not match the filter entries is to forward. |
Drop — The default action for the filter ID for packets that do not match the filter entries is to drop. | |
Filter Match Criteria | IP — Indicates the filter is an IP filter policy. |
Entry | The filter ID filter entry ID. If the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified. |
Ing. Matches | The number of ingress filter matches or hits for the filter entry. The ingress counters count the packets with Layer 2 encapsulation. |
Egr. Matches | The number of egress filter matches or hits for the filter entry. The egress counters count the packets without Layer 2 encapsulation. |
Supported on all 7210 SAS platforms as described in this document
This command displays IPv6 filter information.
The following output are examples of IPv6 filter information, and the associated tables describe the output fields.
Label | Description |
Filter Id | The IP filter ID. |
Scope Template | The filter policy is of type template. |
Exclusive | The filter policy is of type exclusive. |
Applied | No - The filter policy ID has not been applied. Yes - The filter policy ID has been applied. |
Description | The IP filter policy description. |
Label | Description |
Filter Id | The IP filter policy ID. |
Scope | Template — The filter policy is of type template. |
Exclusive — The filter policy is of type exclusive. | |
Entries | The number of entries configured in this filter ID. |
Description | The IP filter policy description. |
Applied | No — The filter policy ID has not been applied. |
Yes — The filter policy ID has been applied. | |
Def. Action | Forward — The default action for the filter ID for packets that do not match the filter entries is to forward. |
Drop — The default action for the filter ID for packets that do not match the filter entries is to drop. | |
Filter Match Criteria | IP — Indicates the filter is an IP filter policy. |
Entry | The filter ID filter entry ID. If the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified. |
Src. IP | The source IP address and mask match criterion. 0.0.0.0/0 indicates no criterion specified for the filter entry. |
Dest. IP | The destination IP address and mask match criterion. 0.0.0.0/0 indicates no criterion specified for the filter entry. |
ICMP Type | The ICMP type match criterion. Undefined indicates no ICMP type specified. |
IP-Option | Specifies matching packets with a specific IP option or a range of IP options in the IP header for IP filter match criteria. |
TCP-syn | False — Configures a match on packets with the SYN flag set to false. |
True — Configured a match on packets with the SYN flag set to true. | |
Off — The state of the TCP SYN flag is not considered as part of the match criteria. | |
Match action | Default — The filter does not have an explicit forward or drop match action specified. If the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified. |
Drop — Drop packets matching the filter entry. | |
Forward — The explicit action to perform is forwarding of the packet. If the action is Forward, then if configured, the next-hop information should be displayed, including Nexthop: <IP address>, Indirect: <IP address> or Interface: <IP interface name>. | |
Ing. Matches | The number of ingress filter matches or hits for the filter entry. |
Src. Port | The source TCP or UDP port number or port range. |
Dest. Port | The destination TCP or UDP port number or port range. |
Dscp | The DiffServ Code Point (DSCP) name. |
ICMP Code | The ICMP code field in the ICMP header of an IP packet. |
TCP-ack | False — Configures a match on packets with the ACK flag set to false. |
True — Configured a match on packets with the ACK flag set to true. | |
Off — The state of the TCP ACK flag is not considered as part of the match criteria. | |
Ing. Matches | The number of ingress filter matches or hits for the filter entry. |
Egr. Matches | The number of egress filter matches or hits for the filter entry. |
Label | Description |
Filter Id | The IPv6 filter policy ID. |
Scope | Template — The filter policy is of type Template. |
Exclusive — The filter policy is of type Exclusive. | |
Entries | The number of entries configured in this filter ID. |
Applied | No — The filter policy ID has not been applied. |
Yes — The filter policy ID has been applied. | |
Def. Action | Forward — The default action for the filter ID for packets that do not match the filter entries is to forward. |
Drop — The default action for the filter ID for packets that do not match the filter entries is to drop. | |
Description | The IP filter policy description. |
Service Id | The service ID on which the filter policy ID is applied. |
SAP | The Service Access Point on which the filter policy ID is applied. (Ingress) The filter policy ID is applied as an ingress filter policy on the interface. (Egress) The filter policy ID is applied as an egress filter policy on the interface. |
Type | The type of service of the service ID. |
Label | Description |
Filter Id | The IPv6 filter policy ID. |
Scope | Template — The filter policy is of type Template. |
Exclusive — The filter policy is of type Exclusive. | |
Entries | The number of entries configured in this filter ID. |
Applied | No — The filter policy ID has not been applied. |
Yes — The filter policy ID has been applied. | |
Def. Action | Forward — The default action for the filter ID for packets that do not match the filter entries is to forward. |
Drop — The default action for the filter ID for packets that do not match the filter entries is to drop. | |
Description | The IP filter policy description. |
Entry | The filter ID filter entry ID. If the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified. |
Ing. Matches | The number of ingress filter matches or hits for the filter entry. |
Egr. Matches | The number of egress filter matches or hits for the filter entry. Egress counters count the packets without Layer 2 encapsulation. Ingress counters count the packets with Layer 2 encapsulation. |
Supported on all 7210 SAS platforms as described in this document
This command displays MAC filter information. When no parameters are specified, a bried listing of IP filters is produced.
The following outputs are examples of MAC filter information. The associated tables describe the output fields.
Label | Description |
MAC Filter Filter Id | The MAC filter policy ID |
Scope | Template — The filter policy is of type Template. |
Exclusive — The filter policy is of type Exclusive. | |
Description | The IP filter policy description. |
Applied | No — The filter policy ID has not been applied. |
Yes — The filter policy ID has been applied. | |
Def. Action | Forward — The default action for the filter ID for packets that do not match the filter entries is to forward. |
Drop — The default action for the filter ID for packets that do not match the filter entries is to drop. | |
Filter Match Criteria | MAC — Indicates the filter is an MAC filter policy. |
Entry | The filter ID filter entry ID. If the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified. |
Description | The filter entry description. |
FrameType | Ethernet — The entry ID match frame type is Ethernet IEEE 802.3. |
Ethernet II — The entry ID match frame type is Ethernet Type II. | |
Src MAC | The source MAC address and mask match criterion. When both the MAC address and mask are all zeros, no criterion specified for the filter entry. |
Dest MAC | The destination MAC address and mask match criterion. When both the MAC address and mask are all zeros, no criterion specified for the filter entry. |
Dot1p | The IEEE 802.1p value for the match criteria. Undefined indicates no value is specified. |
Outer Dot1p | The IEEE 802.1p value for the match criteria used to match the Dot1p in the outermost VLAN tag. Undefined indicates no value is specified. |
Inner Dot1p | The IEEE 802.1p value for the match criteria used to match the Dot1p in the inner VLAN tag. Undefined indicates no value is specified. |
Outer TagVal | The VLAN ID value for the match criteria used to match the VLAN ID in the outermost VLAN tag. Undefined indicates no value is specified. |
Inner TagVal | The IEEE 802.1p value for the match criteria used to match the Dot1p in the inner VLAN tag. Undefined indicates no value is specified. |
Ethertype | The Ethertype value match criterion. |
Match action | Default — The filter does not have an explicit forward or drop match action specified. If the filter entry ID indicates the entry is Inactive, the filter entry is incomplete, no action was specified. |
Drop — Packets matching the filter entry criteria will be dropped. | |
Forward — Packets matching the filter entry criteria is forwarded. | |
Ing. Matches | The number of ingress filter matches or hits for the filter entry. |
Egr. Matches | The number of egress filter matches or hits for the filter entry. |
Label | Description |
Mac Filter Filter Id | The MAC filter policy ID. |
Scope | Template — The filter policy is of type Template. |
Exclusive — The filter policy is of type Exclusive. | |
Description | The MAC filter policy description. |
Applied | No — The filter policy ID has not been applied. |
Yes — The filter policy ID has been applied. | |
Def. Action | Forward — The default action for the filter ID for packets that do not match the filter entries is to forward. |
Drop — The default action for the filter ID for packets that do not match the filter entries is to drop. | |
Filter Match Criteria | Mac — Indicates the filter is an MAC filter policy. |
Entry | The filter ID filter entry ID. If the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified. |
Ing. Matches | The number of ingress filter matches or hits for the filter entry. |
Egr. Matches | The number of egress filter matches or hits for the filter entry. |
Label | Description |
Filter Association | Mac — The filter associations displayed are for a MAC filter policy ID. |
Service Id | The service ID on which the filter policy ID is applied. |
SAP | The Service Access Point on which the filter policy ID is applied. |
Type | The type of service of the Service ID. |
(Ingress) | The filter policy ID is applied as an ingress filter policy on the interface. |
(Egress) | The filter policy ID is applied as an egress filter policy on the interface. |
Supported on all 7210 SAS platforms as described in this document
This command clears the counters associated with the IP filter policy.
By default, all counters associated with the filter policy entries are reset. The scope of which counters are cleared can be narrowed using the command line parameters.
Supported on all 7210 SAS platforms as described in this document
This command clears the counters associated with the IPv6 filter policy.
By default, all counters associated with the filter policy entries are reset. The scope of which counters are cleared can be narrowed using the command line parameters.
Supported on all 7210 SAS platforms as described in this document
This command clears the counters associated with the MAC filter policy.
By default, all counters associated with the filter policy entries are reset. The scope of which counters are cleared can be narrowed using the command line parameters.
Supported on all 7210 SAS platforms as described in this document
This command monitors the counters associated with the IP filter policy.
Supported on all 7210 SAS platforms as described in this document
This command monitors the counters associated with the IPv6 filter policy.
Supported on all 7210 SAS platforms as described in this document
This command monitors the counters associated with the MAC filter policy.