This command creates a text description for a configuration context to help identify the content in the configuration file.
The no form of the command removes any description string from the context.
n/a
The shutdown command administratively disables the entity. The operational state of the entity is disabled as well as the operational state of any entities contained within. When disabled, an entity does not change, reset, or remove any configuration settings or statistics. Many objects must be shut down before they may be deleted. Many entities must be explicitly enabled using the no shutdown command.
Unlike other commands and parameters where the default state is not indicated in the configuration file, shutdown and no shutdown are always indicated in system-generated configuration files.
The no form of the command puts an entity into the administratively enabled state.
no shutdown
This command enables the context to create a filter log policy.
The no form of the command deletes the filter log ID. The log cannot be deleted if there are filter entries configured to write to the log. All filter entry logging associations need to be removed before the log can be deleted.
log 101
This command configures the destination for filter log entries for the specified filter log ID.
Filter logs can be sent to either memory or an existing syslog server. If the filter log destination is memory, the maximum number of entries in the log must be specified.
The no form of the command deletes the filter log association.
no destination
This command enables the context to configure log summarization. These settings apply only if syslog is the log destination.
This command defines the key of the index of the mini-table. If key information is changed while summary is in the no-shutdown state, the filter summary mini-table is flushed and reconfigured with different key information. Log packets received during the reconfiguration time will be handled as if summary was not active.
The no form of the command reverts to the default parameter.
dst-addr
This command configures a memory filter log to store log entries until full or to store the most recent log entries (circular buffer).
Specifying wrap-around configures the memory filter log to store the most recent filter log entries (circular buffer). When the log is full, the oldest filter log entries are overwritten with new entries.
The no form of the command configures the memory filter log to accept filter log entries until full. When the memory filter log is full, filter logging for the log filter ID ceases.
wrap-around
This command creates a configuration context for an IPv4 filter policy.
IP filter policies specify either a forward or a drop action for packets based on the specified match criteria.
The IP filter policy, sometimes referred to as an access control list (ACL), is a template that can be applied to multiple network ports as long as the scope of the policy is template.
Any changes made to the existing policy, using any of the subcommands, will be applied immediately to all network interfaces where this policy is applied.
The no form of the command deletes the IP filter policy. A filter policy cannot be deleted until it is removed from all network interfaces where it is applied.
This command creates a configuration context for an IPv6 filter policy.
IP filter policies specify either a forward or a drop action for packets based on the specified match criteria.
The IP filter policy, sometimes referred to as an access control list (ACL), is a template that can be applied to multiple network ports as long as the scope of the policy is template.
Any changes made to the existing policy, using any of the subcommands, will be applied immediately to all network interfaces where this policy is applied.
The no form of the command deletes the IP filter policy. A filter policy cannot be deleted until it is removed from all network interfaces where it is applied.
This command enables the context for a MAC filter policy.
The MAC filter policy specifies either a forward or a drop action for packets based on the specified match criteria.
The MAC filter policy, sometimes referred to as an access control list (ACL), is a template that can be applied to multiple services as long as the scope of the policy is template.
A MAC filter policy cannot be applied to a network interface, a VPRN service, or an IES service.
Any changes made to the existing policy, using any of the sub-commands, will be applied immediately to all services where this policy is applied.
The no form of the command deletes the MAC filter policy. A filter policy cannot be deleted until it is removed from all SAPs where it is applied.
This command enables the context for a VLAN filter policy.
The VLAN filter policy specifies either a forward or a drop action for packets based on the specified match criteria.
The VLAN filter policy, sometimes referred to as an access control list (ACL), is a template that can be applied to ring ports on the 2-port 10GigE (Ethernet) Adapter card and 2-port 10GigE (Ethernet) module. Each ring port can support one VLAN filter, and the same VLAN filter can be applied to both ring ports. The scope of a VLAN policy is always template.
A VLAN filter policy cannot be applied to any other type of adapter card.
Any changes made to an existing policy, using any of the sub-commands, is applied immediately to all ring ports where this policy is applied.
The no form of the command deletes the VLAN filter policy. A filter policy cannot be deleted until it is removed from all the ring ports where it is applied.
This command specifies the action to be applied to packets when the packets do not match the specified criteria in all of the IP, MAC, or VLAN filter entries of the filter.
drop
This command renumbers existing IP, MAC, or VLAN filter entries to properly sequence filter entries.
This may be required in some cases since the OS exits when the first match is found and executes the actions according to the accompanying action command. This requires that entries be sequenced correctly from most to least explicit.
This command configures the filter policy scope as exclusive or template. If the scope of the policy is template and is applied to one or more network interfaces, the scope cannot be changed.
The no form of the command sets the scope of the policy to the default of template.
template
This command creates or edits a filter entry. Multiple entries can be created using unique entry-id numbers within the filter. The 7705 SAR implementation exits the filter on the first match found and executes the actions in accordance with the accompanying action command. For this reason, entries must be sequenced correctly, from most to least explicit.
IPv4 filter entries can specify one or more matching criteria, with one caveat. In order to support the maximum 256 entries for IPv4 filters, any entry that uses source port (src-port) and/or destination port (dst-port) ranges (lt, gt, or range keywords) as match criteria must be within the first 64 entries. See the dst-port and src-port commands for more information.
An entry might not have any match criteria defined (in which case, everything matches) but must have at least the keyword action for it to be considered complete. Entries without the action keyword are considered incomplete and are rendered inactive.
The no form of the command removes the specified entry from the filter. Entries removed from the filter are immediately removed from all entities to which that filter is applied.
n/a
This command specifies what action to take (drop or forward) when packets match the entry criteria. The action keyword must be entered for the entry to be active. If neither drop nor forward is specified, the filter action is drop.
The action forward next-hop keywords cannot be applied to multicast traffic and only apply to IPv4.
The action forward fc keywords only apply to IPv4.
Multiple action statements entered will overwrite previous action statements when defined.
The no form of the command removes the specified action statement. The filter entry is considered incomplete and is rendered inactive without the action keyword.
no action
If the next hop is not available, then a routing lookup is performed and if a match is found then the packet will be forwarded to the result of that lookup. If no match is found, then an "ICMP destination unreachable" message is send back to the origin.
There are eight forwarding classes, providing different classes of service. The forwarding classes are: nc (network control), h1 (high 1), ef (expedited forwarding), h2 (high 2), l1 (low 1), l2 (low 2), af (assured forwarding), be (best effort).
This command specifies what action to take (drop or forward) when packets match the entry criteria. The action keyword must be entered and for the entry to be active. If neither drop nor forward is specified, the filter action is drop.
Multiple action statements entered will overwrite previous action statements when defined.
The no form of the command removes the specified action statement. The filter entry is considered incomplete and is rendered inactive without the action keyword.
drop
This command enables the context to enable filter logging for a filter entry and specifies the destination filter log ID.
The filter log ID must exist before a filter entry can be enabled to use the filter log ID.
The no form of the command disables logging for the filter entry.
no log
This command enables the context to enter match criteria for the IPv4 filter entry. When the match criteria have been satisfied, the action associated with the match criteria is executed.
If more than one match criterion (within one match statement) is configured, all criteria must be satisfied (AND function) before the action associated with the match is executed.
A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.
The no form of the command removes the match criteria for the entry-id.
Protocol ID | Protocol | Description |
1 | icmp | Internet Control Message |
2 | igmp | Internet Group Management |
4 | ip | IP in IP (encapsulation) |
6 | tcp | Transmission Control |
8 | egp | Exterior Gateway Protocol |
9 | igp | Any private interior gateway |
17 | udp | User Datagram |
27 | rdp | Reliable Data Protocol |
41 | ipv6 | IPv6 |
43 | ipv6-route | Routing Header for IPv6 |
45 | idrp | Inter-Domain Routing Protocol |
46 | rsvp | Reservation Protocol |
47 | gre | General Routing Encapsulation |
58 | ipv6-icmp | ICMP for IPv6 |
59 | ipv6-no-nxt | No Next Header for IPv6 |
60 | ipv6-opts | Destination Options for IPv6 |
80 | iso-ip | ISO Internet Protocol |
88 | eigrp | EIGRP |
89 | ospf-igp | OSPFIGP |
97 | ether-ip | Ethernet-within-IP Encapsulation |
98 | encap | Encapsulation Header |
102 | pnni | PNNI over IP |
103 | pim | Protocol Independent Multicast |
112 | vrrp | Virtual Router Redundancy Protocol |
115 | l2tp | Layer Two Tunneling Protocol |
118 | stp | Schedule Transfer Protocol |
123 | ptp | Performance Transparency Protocol |
124 | isis | ISIS over IPv4 |
126 | crtp | Combat Radio Transport Protocol |
127 | crudp | Combat Radio User Datagram |
![]() | Note:
|
This command enables the context to enter match criteria for the IPv6 filter entry. When the match criteria have been satisfied, the action associated with the match criteria is executed.
If more than one match criterion (within one match statement) is configured, all criteria must be satisfied (AND function) before the action associated with the match is executed.
A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.
The no form of the command removes the match criteria for the entry-id.
This command creates the context for entering/editing match criteria for the filter entry and specifies an Ethernet frame type for the entry. When the match criteria have been satisfied, the action associated with the match criteria is executed.
If more than one match criterion (within one match statement) is configured, then all criteria must be satisfied (AND function) before the action associated with the match will be executed.
A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.
The no form of the command removes the match criteria for the entry-id.
frame-type 802dot3
This command accesses the match criteria for the filter entry and specifies a match criteria. If the match criteria are satisfied, the action associated with the match criteria is executed.
Only one match criterion (within one match statement) is allowed.
The no form of the command removes the match criteria for the entry-id.
no match
This command configures a DiffServ Code Point (DSCP) name to be used as an IP filter match criterion.
The no form of the command removes the DSCP match criterion.
no dscp
This command configures a destination IPv4 address range to be used as an IP filter match criterion.
To match on the destination IP address, specify the address and its associated mask; for example, 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 may also be used.
The no form of the command removes the destination IP address match criterion.
n/a
This command configures a destination IPv6 address range to be used as an IP filter match criterion.
To match on the destination IP address, specify the address and prefix length; for example, 11::12/128.
The no form of the command removes the destination IP address match criterion.
n/a
This command configures a destination MAC address to be used as a MAC filter match criterion.
To match on the destination MAC address, specify the IEEE address.
The no form of the command removes the destination MAC address match criterion.
no dst-mac
This command configures a destination TCP or UDP port number or port range for an IP filter match criterion.
The no form of the command removes the destination port match criterion.
n/a
lt specifies that all port numbers less than dst-port-number match
gt specifies that all port numbers greater than dst-port-number match
eq specifies that dst-port-number must be an exact match
This command configures an Ethernet type II Ethertype value to be used as a MAC filter match criterion.
The Ethernet type field is a 2-byte field used to identify the protocol carried by the Ethernet frame. For example, 0800 is used to identify IPv4 packets. The Ethernet type II frame Ethertype value to be used as a match criterion can be expressed as a hexadecimal (0x0600 to 0xFFFF) or a decimal (1536 to 65535) value.
The Ethernet type field is used by the Ethernet version-II frames.
The no form of the command removes the previously entered etype field as the match criteria.
no etype
This command configures fragmented or non-fragmented IP packets as an IP filter match criterion.
The no form of the command removes the match criterion.
This command applies to IPv4 filters only.
false
This command configures matching on an ICMP code field in the ICMP header of an IPv4 or IPv6 packet as a filter match criterion.
This option is only meaningful if the protocol match criteria specifies ICMP (1).
The no form of the command removes the criterion from the match entry.
no icmp-code
This command configures matching on the ICMP type field in the ICMP header of an IPv4 or IPv6 packet as a filter match criterion.
This option is only meaningful if the protocol match criteria specifies ICMP (1).
The no form of the command removes the criterion from the match entry.
no icmp-type
This command configures matching packets with a specific IP option or a range of IP options in the IP header as an IP filter match criterion.
The option type octet contains three fields:
The no form of the command removes the match criterion.
This command applies to IPv4 filters only.
no ip-option
The decimal value entered for the match should be a combined value of the 8-bit option type field and not just the option number. Therefore, to match on IP packets that contain the Router Alert option (option number = 20), enter the option type of 148 (10010100).
This 8-bit mask can be entered using decimal, hexadecimal, or binary formats (see Table 46).
Format Style | Format Syntax | Example |
Decimal | DDD | 20 |
Hexadecimal | 0x | 0x14 |
Binary | 0bBBBBBBBB | 0b0010100 |
This command configures matching packets that contain more than one option field in the IP header as an IP filter match criterion.
The no form of the command removes the checking of the number of option fields in the IP header as a match criterion.
This command applies to IPv4 filters only.
no multiple-option
This command configures matching packets that contain the option field or have an option field of 0 in the IP header as an IP filter match criterion.
The no form of the command removes the checking of the option field in the IP header as a match criterion.
This command applies to IPv4 filters only.
This command configures a source IPv4 address range to be used as an IP filter match criterion.
To match on the source IP address, specify the address and its associated mask; for example, 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 may also be used.
The no form of the command removes the source IP address match criterion.
no src-ip
This command configures a source IPv6 address range to be used as an IP filter match criterion.
To match on the source IP address, specify the address and prefix length; for example, 11::12/128.
The no form of the command removes the source IP address match criterion.
n/a
This command configures a source MAC address to be used as a MAC filter match criterion.
The no form of the command removes the source MAC address as the match criterion.
no src-mac
This command configures a source TCP or UDP port number or port range for an IP filter match criterion.
The no form of the command removes the source port match criterion.
no src-port
lt specifies that all port numbers less than src-port-number match
gt specifies that all port numbers greater than src-port-number match
eq specifies that src-port-number must be an exact match
This command configures matching on the ACK bit being set or reset in the control bits of the TCP header of an IP packet as an IP filter match criterion.
The no form of the command removes the criterion from the match entry.
no tcp-ack
This command configures matching on the SYN bit being set or reset in the control bits of the TCP header of an IP packet as an IP filter match criterion.
The SYN bit is normally set when the source of the packet wants to initiate a TCP session with the specified destination IP address.
The no form of the command removes the criterion from the match entry.
no tcp-syn
This command discards changes made to a security feature.
n/a
This command enters the mode to create or edit security features.
n/a
This command saves changes made to security features.
n/a
This command configures a profile group that provides a context within which you can configure security features such as session idle timeouts. Profile 1 is a default profile and cannot be modified.
The no form of the command removes the configured profile group.
1
This command configures a profile group name.
The no form of the command removes the configured profile group name.
This command configures session idle timeouts for this policy.
This command sets the timeout for a half-open NAT ICMP session. A half-open NAT ICMP session is created when an ICMP request is sent but no ICMP response is received.
The no form of the command removes the timeout set for icmp-request.
n/a
This command sets the timeout for a TCP session in the established state.
The no form of the command removes the timeout set for tcp-established.
n/a
This command configures the timeout applied to a TCP session in the SYN state.
The no form of the command removes the timeout set for tcp-syn.
n/a
This command configures the timeout applied to a TCP session in a time-wait state.
The no form of the command removes the timeout entered set for tcp-time-wait.
n/a
This command configures the idle timeout applied to a TCP session in a transitory state.
The no form of the command removes the timeout entered set for tcp-transitory.
n/a
This command configures the UDP mapping timeout.
The no form of the command removes the UDP mapping timeout.
n/a
This command configures the timeout applied to a UDP session with destination port 53.
The no form of the command removes the udp-dns timeout.
n/a
This command configures the timeout applied to a UDP session in its initial state.
The no form of the command removes the udp-initial timeout.
n/a
This command configures a policy group that provides a context within which you can configure a security policy.
The no form of the command removes the configured policy group.
n/a
This command configures a NAT policy entry.
The no form of this command deletes the entry with the specified ID. When an entry is deleted, all configuration parameters for the entry are also deleted.
This command specifies what action to take (forward, reject, or nat) when packets match the entry criteria. The action keyword must be entered and a keyword must be specified for the entry to be active. If reject, forward, or nat is not specified, the action is rejected.
The nat and forward actions cause a 6-tuple lookup (src/dst IP, src/dst port, protocol, src zone). If there is a match, NAT is applied and the packet is routed based on the datapath session table.
Multiple action statements entered will overwrite previous action statements when defined.
The no form of the command removes the specified action statement. An entry is considered incomplete and is rendered inactive without the action keyword.
no action
This command specifies the destination IP address and port to which packets that have NAT applied to them are sent.
NAT actions cause a 6-tuple lookup (src/dst IP, src/dst port, protocol, src zone). If there is a match, NAT is applied and the packet is routed based on the datapath session table.
Multiple action statements entered will overwrite previous action statements when defined.
The no form of the command removes the specified action statement. An entry is considered incomplete and is rendered inactive without the action keyword.
no action
This command is used to enter the limit context.
n/a
This command specifies the maximum number of concurrent sessions that can be created by NAT within a zone.
The no form of the command returns the system to the default.
no concurrent-sessions
This command configures match criteria for an entry based on the specified protocol.
The no form of the command removes the match criteria for the entry.
n/a
This command sets the direction of the traffic to be matched against the IP criteria. For example, if zone-inbound is configured, then all inbound traffic to the zone has the match criteria applied to it.
both
This command configures the destination IP address or address range to be used in the matching criteria of a policy entry. All packets within the specified IP address range are processed for matching criteria.
The no form of the command removes the destination IP address match criteria.
n/a
This command configures a destination protocol TCP or UDP port number or port range for the match criteria.
The no form of the command removes the destination port match criteria.
no dst-port
lt specifies that all port numbers less than tcp/udp port number match
gt specifies that all port numbers greater than tcp/udp port number match
eq specifies that tcp/udp port number must be an exact match
This command configures matching on an ICMP code field in the ICMP header of an IPv4 packet as a match criterion.
This option is only meaningful if the protocol match criterion specifies ICMP (1).
The no form of the command removes the criterion from the match entry.
no icmp-code
This command configures matching on the ICMP type field in the ICMP header of an IPv4 packet as a match criterion.
This option is only meaningful if the protocol match criterion specifies ICMP (1).
The no form of the command removes the criterion from the match entry.
no icmp-type
This command configures the source IP address or address range to be used in the matching criteria of a policy entry. All packets within the specified IP address range are processed for matching criteria.
The no form of the command removes the source IP address match criteria.
n/a
This command configures a source protocol TCP or UDP port number or port range for the match criteria.
The no form of the command removes the source port match criteria.
no src-port
lt specifies that all port numbers less than tcp/udp port number match
gt specifies all port numbers greater than tcp/udp port number match
eq specifies that tcp/udp port number must be an exact match
This command assigns an already configured profile to a policy.
The no form of the command removes the assigned profile.
1
This command configures a policy group name.
The no form of the command removes the configured policy group name.
This command configures the high-watermark threshold for NAT sessions. The alarm is raised when the high-watermark threshold is reached or exceeded. The value must be greater than or equal to the session-low-wmark value.
The no form of the command removes the high-watermark setting.
no session-high-wmark
This command configures the low-watermark threshold for NAT sessions. The alarm is cleared when the session utilization percentage is equal to or less than the low-watermark threshold. The value must be lower than or equal to the session-high-wmark value.
The no form of the command removes the low-watermark setting.
no session-low-wmark
This command displays IPv4 and IPv6 filter information.
The following outputs are examples of IP filter information:
Label | Description |
Filter Id | The IP filter ID |
Scope | Template — the filter policy is of type template |
Exclusive — the filter policy is of type exclusive | |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Description | The IP filter policy description |
Label | Description |
Filter Id | The IP filter policy ID |
Scope | Template — the filter policy is of type template |
Exclusive — the filter policy is of type exclusive | |
Entries | The number of entries configured in this filter ID |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Def. Action | Drop — the default action for the filter ID for packets that do not match the filter entries is to drop |
Filter Match Criteria | IP — the filter is an IPv4 filter policy |
IPv6 — the filter is an IPv6 filter policy | |
Entry | The filter entry ID. If the filter entry ID indicates that the entry is Inactive, the filter entry is incomplete as no action has been specified. |
Description | The IP filter policy description |
Src. IP | The source IP address and prefix length match criterion |
Dest. IP | The destination IP address and prefix length match criterion |
Protocol | The protocol ID for the match criteria. Undefined indicates no protocol specified. (IPv4 filters only) |
Next Header | The next header ID for the match criteria. Undefined indicates no next header is specified. (IPv6 filters only) |
ICMP Type | The ICMP type match criterion. Undefined indicates no ICMP type is specified. |
Fragment: (IPv4 filters only) | Off — configures a match on all unfragmented packets |
On — configures a match on all fragmented packets | |
IP-Option | Specifies matching packets with a specific IP option or range of IP options in the IP header for IP filter match criteria (IPv4 filters only) |
TCP-syn | Off — the SYN bit is disabled |
On — the SYN bit is set | |
Match action | Default — the filter does not have an explicit forward or drop match action specified. If the filter entry ID indicates that the entry is Inactive, the filter entry is incomplete as no action was specified. |
Drop — drop packets matching the filter entry | |
Forward — forward packets matching the filter entry | |
Ing. Matches | The number of ingress filter matches/hits for the filter entry |
Src. Port | The source TCP or UDP port number or port range |
Dest. Port | The destination TCP or UDP port number or port range |
Dscp | The DSCP name |
ICMP Code | The ICMP code field in the ICMP header of an IP packet |
Option-present: (IPv4 filters only) | Off — does not search for packets that contain the option field or have an option field of zero |
On — matches packets that contain the option field or have an option field of zero | |
Multiple Option: (IPv4 filters only) | Off — the option fields are not checked |
On — packets containing one or more option fields in the IP header will be used as IP filter match criteria | |
TCP-ack | Off — the ACK bit is not matched |
On — matches the ACK bit being set or reset in the control bits of the TCP header of an IP packet |
Label | Description |
Filter Id | The IP filter policy ID |
Scope | Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive | |
Entries | The number of entries configured in this filter ID |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Def. Action | Drop — the default action for the filter ID for packets that do not match the filter entries is to drop |
Filter Association | IP or IPv6 |
Entry | The filter entry ID. If the filter entry ID indicates that the entry is Inactive, the filter entry is incomplete as no action was specified. |
Src. IP | The source IP address and mask match criterion. 0.0.0.0/0 indicates no criterion specified for the filter entry. |
Dest. IP | The destination IP address and mask match criterion. 0.0.0.0/0 indicates no criterion specified for the filter entry. |
Protocol | The protocol ID for the match criteria. Undefined indicates no protocol specified. (IPv4 filters only) |
Next Header | The next header ID for the match criteria. Undefined indicates no next header is specified. (IPv6 filters only) |
ICMP Type | The ICMP type match criterion. Undefined indicates no ICMP type specified. |
Fragment: (IPv4 filters only) | Off — configures a match on all unfragmented packets |
On — configures a match on all fragmented packets | |
TCP-syn | Off — the SYN bit is disabled |
On — the SYN bit is set | |
Match action | Default — the filter does not have an explicit forward or drop match action specified. If the filter entry ID indicates the entry is inactive, the filter entry is incomplete (no action was specified). |
Drop — drop packets matching the filter entry | |
Forward — forward packets matching the filter entry | |
Ing. Matches | The number of ingress filter matches/hits for the filter entry |
Src. Port | The source TCP or UDP port number or port range |
Dest. Port | The destination TCP or UDP port number or port range |
Dscp | The DSCP name |
ICMP Code | The ICMP code field in the ICMP header of an IP packet |
Option-present: (IPv4 filters only) | Off — does not search for packets that contain the option field or have an option field of zero |
On — matches packets that contain the option field or have an option field of zero | |
Multiple Option: (IPv4 filters only) | Off — the option fields are not checked |
On — packets containing one or more option fields in the IP header will be used as IP filter match criteria | |
TCP-ack | Off — the ACK bit is not matched |
On — matches the ACK bit being set or reset in the control bits of the TCP header of an IP packet |
Label | Description |
Filter Id | The IP filter policy ID |
Scope | Template — the filter policy is of type Template: |
Exclusive — the filter policy is of type Exclusive: | |
Entries | The number of entries configured in this filter ID |
Applied | No — the filter policy ID has not been applied: |
Yes — the filter policy ID is applied: | |
Def. Action | Drop — the default action for the filter ID for packets that do not match the filter entries is to drop: |
Filter Match Criteria | IP — indicates the filter is an IPv4 filter policy: |
IPv6 — indicates the filter is an IPv6 filter policy | |
Entry | The filter entry ID. If the filter entry ID indicates the entry is (Inactive), the filter entry is incomplete as no action has been specified. |
Ing. Matches | The number of ingress filter matches/hits for the filter entry |
This command displays filter log information.When a filter log command is used with a MAC filter and a packet is matched, the log entry is different from an IP filter entry. For a MAC filter, the source and destination IP address of incoming packets are not included in the log.
The following outputs are examples of filter log information:
Label | Description |
Log-Id | The filter log ID |
Dest./Destination | The destination of the filter log: memory or syslog |
Id/Entries | The number of entries configured for this filter log |
Enabled | Indicates whether the log is administratively enabled |
Admin State | The administrative state of the log: enabled or disabled |
Description | The description string configured for the filter log |
Wrap | Indicates whether the wrap-around function (circular buffer) is enabled |
Maximum entries configured | The maximum number of entries allowed in this filter log |
Number of entries logged | The number of entries in this filter log |
(date) | The timestamp of the entry |
Ip Filter | The filter ID and entry ID |
Desc. | The description string for the filter log |
SDP | The SDP using this filter |
Direction | The direction of the traffic being filtered |
Action | The action taken as a result of the filter |
Src MAC | The source MAC address of the packet |
Dst MAC | The destination MAC address of the packet |
EtherType | The Ethertype of the packet |
Src IP | The source IP address of the packet |
Dst IP | The destination IP address of the packet |
Flags | The number of flags associated with the packet |
TOS | The type of service for the packet expressed as a hexadecimal number. Use the show>qos>dscp-table command to see the definitions of the numbers. |
TTL | The time to live setting remaining for the packet |
Protocol | The protocol used for the packet |
====================================================================
Label | Description |
Total Log Instances (Allowed) | The maximum allowed instances of filter logs allowed on the system |
Total Log Instances (In Use) | The instances of filter logs presently existing on the system |
Total Log Bindings | The count of the filter log bindings presently existing on the system |
Type | The type of filter: CPM, IP, or MAC |
FilterID | The unique identifier of the filter |
EntryID | The unique identifier of an entry in the filter table |
Log | The filter log identifier |
Instantiated | Specifies if the filter log for this filter entry has been enabled |
This command displays MAC filter information.
The following outputs are examples of MAC filter information:
When no parameters are specified, a brief listing of MAC filters is produced.
Label | Description |
Filter-Id | The MAC filter ID |
Scope: | Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive | |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Description | The MAC filter policy description |
When the filter ID is specified, detailed filter information for the filter ID and its entries is displayed.
Label | Description |
MAC Filter | |
Filter Id | The MAC filter policy ID |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Scope | Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive | |
Def. Action | Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop | |
Entries | The number of entries in the filter policy |
Description | The MAC filter policy description |
Filter Match Criteria: Mac | |
Entry | The filter ID filter entry ID. If the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified |
FrameType | Ethernet — the entry ID match frame type is Ethernet IEEE 802.3 |
Ethernet II — the entry ID match frame type is Ethernet Type II. | |
Description | The filter entry description |
Log Id | The filter log identifier |
Src Mac | The source MAC address and mask match criterion. When both the MAC address and mask are all zeros, no criterion is specified for the filter entry |
Dest Mac | The destination MAC address and mask match criterion. When both the MAC address and mask are all zeros, no criterion is specified for the filter entry |
Dot1p | The IEEE 802.1p value for the match criterion. Undefined indicates that no value is specified |
Ethertype | The Ethertype value match criterion |
DSAP | The DSAP value match criterion. Undefined indicates that no value is specified |
SSAP | The SSAP value match criterion. Undefined indicates that no value is specified |
Snap-pid | The Ethernet SNAP PID value match criterion. Undefined indicates that no value is specified |
Esnap-oui-zero | Non-Zero — filter entry matches a non-zero value for the Ethernet SNAP OUI |
Zero — filter entry matches a zero value for the Ethernet SNAP OUI | |
Undefined — no Ethernet SNAP OUI value is specified | |
Match action | Default— the filter does not have an explicit forward or drop match action specified. If the filter entry ID indicates the entry is Inactive, the filter entry is incomplete, no action was specified |
Drop — packets matching the filter entry criteria will be dropped | |
Forward — packets matching the filter entry criteria are forwarded | |
Ing. Matches | The number of ingress filter matches/hits for the filter entry |
Egr. Matches | The number of egress filter matches/hits for the filter entry |
Label | Description |
Filter Id | The IP filter ID |
Scope | Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive | |
Entries | The number of entries in the filter |
Description | The MAC filter policy description |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Def. Action | Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop | |
Filter Association | The type of filter association |
Label | Description |
Filter Id | The IP filter ID |
Scope | Template — the filter policy is of type Template |
Exclusive — the filter policy is of type Exclusive | |
Entries | The number of entries in the filter |
Description | The MAC filter policy description |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Def. Action | Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop | |
Filter Match Criteria: Mac | |
Entry | The filter ID filter entry ID. If the filter entry ID indicates the entry is (Inactive), then the filter entry is incomplete as no action has been specified. |
FrameType | Ethernet — the entry ID match frame type is Ethernet IEEE 802.3 |
Ethernet II — the entry ID match frame type is Ethernet Type II | |
Ing. Matches | The number of ingress filter matches/hits for the filter entry |
Egr. Matches | The number of egress filter matches/hits for the filter entry |
This command displays VLAN filter information.
The following outputs are examples of VLAN filter information:
When no parameters are specified, a brief listing of VLAN filters is displayed.
Label | Description |
Filter-Id | The VLAN filter ID |
Scope | Template — the VLAN filter policy is always of type Template |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Description | The VLAN filter policy description |
When the filter ID is specified, detailed filter information for the filter ID and its entries is displayed.
Label | Description |
VLAN Filter | |
Filter Id | The VLAN filter policy ID |
Applied | No — the filter policy ID has not been applied |
Yes — the filter policy ID is applied | |
Scope | Template — the filter policy is always of type Template |
Def. Action | Forward — the default action for the filter ID for packets that do not match the filter entries is to forward |
Drop — the default action for the filter ID for packets that do not match the filter entries is to drop | |
Entries | The number of entries in the filter policy |
Description | The VLAN filter policy description |
Filter Match Criteria: | |
Entry | The filter entry ID. If the filter entry ID indicates that the entry is (Inactive), then the filter entry is incomplete as no action has been specified |
Description | The filter entry description |
Match | VLAN— the type of match criteria for the entry is VLAN |
Untagged — the type of match criteria for the entry is untagged | |
Action | Drop — packets matching the filter entry criteria will be dropped |
Forward — packets matching the filter entry criteria will be forwarded | |
Operation | The match criteria operator. Valid operators are: lt (less than), gt (greater than), eq (equal to), and range (for a range of VLAN IDs). |
Vlan-Id | The VLAN ID when the match criteria defines a specific VLAN ID |
From | The start VLAN ID when the match criteria defines a VLAN ID range |
To | The end VLAN ID when the match criteria defines a VLAN ID range |
This command displays NAT policy information.
The following output is an example of policy information, and Table 59 describes the fields.
Label | Description |
Policy Id | The NAT policy ID |
Name | The name of the policy |
Scope | Template — the policy is of type template |
Exclusive — the policy is of type exclusive | |
Entries | The number of entries configured in this policy ID |
Description | The security policy description |
Applied | No — the security policy ID has not been applied |
Yes — the security policy ID is applied | |
Def. Action | Reject — the default action for packets that do not match the policy entries is to reject |
Policy Match Criteria | |
Entry | The policy entry ID |
Description | The policy entry description |
Match Direction | Zone inbound — the match criteria is applied to packets inbound to the zone |
Zone outbound — the match criteria is applied to packets outbound from the zone | |
Both — the match criteria is applied to packets both inbound to and outbound from the zone | |
Src. IP | The source IP address and prefix length match criterion |
Dest. IP | The destination IP address and prefix length match criterion |
Protocol | The protocol for the match criteria. Undefined indicates no protocol specified. |
ICMP Type | The ICMP type match criterion. Undefined indicates no ICMP type is specified. |
Profile ID | The NAT profile ID |
Active | No — the policy match criteria entry is not active |
Yes — the policy match criteria entry is active | |
Action | Nat — applies NAT to the packets matching the profile entry |
Reject — rejects packets matching the profile entry | |
Forward — forward packets matching the profile entry | |
Src. Port | The source TCP or UDP port number or port range |
Dest. Port | The destination TCP or UDP port number or port range |
ICMP Code | The ICMP code field in the ICMP header of an IP packet |
Session Limit | The maximum number of concurrent sessions |
This command displays NAT profile information.
The following output is an example of profile information, and Table 60 describes the fields.
Label | Description |
Profile Id | The NAT profile ID |
Name | The name of the profile |
Description | The profile description |
TCP Syn-Rcvd | Timeout configured for a TCP session in a SYN state |
TCP Transitory | Timeout configured for a TCP session in a transitory state |
TCP Established | Timeout configured for a TCP session in an established state |
TCP Time-Wait | Timeout configured for a TCP session in a time-wait state |
UDP Initial | Timeout configured for a UDP session in an initial state |
UDP Idle | Timeout configured for a UDP session in an idle state |
UDP DNS | Timeout configured for a UDP session with destination port 53 |
ICMP Request | Timeout configured for an ICMP session in which an ICMP request is sent but no ICMP response is received |
Applied | No — the security profile ID has not been applied |
Yes — the security profile ID is applied |
This command displays a summary of NAT security information.
The following output is an example of NAT summary information.
This command displays NAT zone information.
The following output is an example of zone information:
This command displays NAT pool information.
The following output is an example of zone pool information:
This command displays NAT policy information.
The following output is an example of zone policy information:
This command displays NAT session information.
The following output is an example of zone session information.
This command clears the counters associated with the IPv4 filter policy.
By default, all counters associated with the filter policy entries are reset. The scope of which counters are cleared can be narrowed using the command line parameters.
clears all counters associated with the IPv4 filter policy entries
This command clears the counters associated with the IPv6 filter policy.
By default, all counters associated with the filter policy entries are reset. The scope of which counters are cleared can be narrowed using the command line parameters.
clears all counters associated with the IPv6 filter policy entries
This command clears the entries associated with the specified filter log. The clear command applies only to logs whose destination is to memory.
This command clears the counters associated with the MAC filter policy.
By default, all counters associated with the filter policy entries are reset. The scope of which counters are cleared can be narrowed using the command line parameters.
clears all counters associated with the MAC filter policy entries
This command clears the specified sessions and can also clear the associated session statistics.
This command clears NAT zone information.
This command monitors the counters associated with the IPv4 filter policy.
This command monitors the counters associated with the IPv6 filter policy.
This command monitors the counters associated with the MAC filter policy.
This command enables or disables debugging for the zone.