4.4. Filter Configuration Command Reference

4.4.1. Command Hierarchies

4.4.1.1. IPv4 Filter Policy Commands

config
— filter
ip-exception filter-id [create]
— no ip-exception filter-id
description description-string
entry entry-id [create]
— no entry entry-id
description description-string
match [protocol protocol-id]
— no match
dst-ip {ip-address/mask | ip-address ipv4-address-mask | ip-prefix-list prefix-list-name}
— no dst-ip
dst-port {lt | gt | eq} dst-port-number
dst-port range dst-port-number dst-port-number
— no dst-port
-code -code
— no -code
-type -type
— no -type
src-ip {ip-address/mask | ip-address ipv4-address-mask | ip-prefix-list prefix-list-name}
— no src-ip
src-port {lt | gt | eq} src-port-number
src-port range src-port-number src-port-number
— no src-port
filter-name filter-name
renum old-entry-id new-entry-id
scope {exclusive | template | embedded}
ip-filter filter-id [name filter-name] [create]
— no ip-filter {filter-id | filter-name}
default-action {drop | forward}
description description-string
embed-filter ip-filter-id [offset offset] [{active | inactive}]
— no embed-filter ip-filter-id
embed-filter flowspec [group group-id] [router {router-instance | service-name vprn-service-name}] [offset offset] [{active | inactive}]
— no embed-filter flowspec [group group-id]
embed-filter open-flow ofs-name [{system | service {service-id | service-name} | sap sap-id}] [offset offset] [{active | inactive}]
— no embed-filter open-flow ofs-name [{system | service {service-id | service-name} | sap sap-id}]
embed-filter vsd vsd-filter-id [offset offset] [{active | inactive}]
— no embed-filter vsd vsd-filter-id
entry entry-id [create]
— no entry entry-id
[no] action [secondary]
drop
drop packet-length {lt | gt | eq} packet-length-value
drop packet-length range packet-length-value packet-length-value
drop pattern expression expression mask mask offset-type offset-type offset-value offset-value
drop ttl {lt | gt | eq} ttl-value
drop ttl range ttl-value ttl-value
remark dscp dscp-name
fc fc-name
— no fc
forward bonding-connection connection-id
forward esi esi sf-ip ip-address vas-interface interface-name router router-instance
forward esi esi sf-ip ip-address vas-interface interface-name router service-name service-name
forward esi esi service-id vpls-service-id
forward gre-tunnel gre-tunnel-name
forward lsp lsp-name
forward mpls-policy ip-address
forward next-hop ip-address
forward next-hop ip-address router router-instance
forward next-hop ip-address router service-name service-name
forward next-hop indirect ip-address
forward next-hop indirect ip-address router router-instance
forward next-hop indirect ip-address router service-name service-name
forward next-hop interface ip-int-name
forward redirect-policy policy-name
forward router router-instance
forward router service-name service-name
forward sap sap-id
forward sdp sdp-id:vc-id
forward srte-policy ip-address color color-id
forward vprn-target bgp-nh ip-address router router-instance [adv-prefix ip-address/mask] [lsp lsp-name]
forward vprn-target bgp-nh ip-address router service-name service-name [adv-prefix ip-address/mask] [lsp lsp-name]
forward-when pattern expression expression mask mask offset-type offset-type offset-value offset-value
http-redirect rdr-url-string [allow-radius-override]
nat [nat-policy nat-policy-name]
rate-limit value
rate-limit value packet-length {lt | gt | eq} packet-length-value
rate-limit value packet-length range packet-length-value packet-length-value
rate-limit value pattern expression pattern expression mask mask offset-type offset-type offset-value offset-value
rate-limit value ttl {lt | gt | eq} ttl-value
rate-limit value ttl range ttl-value ttl-value
remark dscp dscp-name
description description-string
egress-pbr {default-load-balancing | l4-load-balancing}
— no egress-pbr
[no] filter-sample
log log-id
— no log
match [{protocol protocol-id | protocol-list protocol-list-name}]
match protocol none
— no match
destination-class dest-index
dscp dscp-name
— no dscp
dst-ip {ip-address/mask | ip-address ipv4-address-mask | ip-prefix-list prefix-list-name}
— no dst-ip
dst-port {lt | gt | eq} dst-port-number
dst-port port-list port-list-name
dst-port range dst-port-number dst-port-number
— no dst-port
fragment {true | false | first-only | non-first-only}
— no fragment
-code -code
— no -code
-type -type
— no -type
ip-option ip-option-value [ip-option-mask]
— no ip-option
multiple-option {true | false}
option-present {true | false}
packet-length {lt | gt | eq} packet-length-value
packet-length range packet-length-value packet-length-value
port {lt | gt | eq} port-number
port port-list port-list-name
port range port-number port-number
— no port
src-ip {ip-address/mask | ip-address ipv4-address-mask | ip-prefix-list prefix-list-name}
— no src-ip
src-mac ieee-address [ieee-address-mask]
— no src-mac
src-port {lt | gt | eq} src-port-number
src-port port-list port-list-name
src-port range src-port-number src-port-number
— no src-port
src-route-option {true | false}
tcp-ack {true | false}
— no tcp-ack
tcp-cwr {true | false}
— no tcp-cwr
tcp-ece {true | false}
— no tcp-ece
tcp-fin {true | false}
— no tcp-fin
tcp-ns {true | false}
— no tcp-ns
tcp-psh {true | false}
— no tcp-psh
tcp-rst {true | false}
— no tcp-rst
tcp-syn {true | false}
— no tcp-syn
tcp-urg {true | false}
— no tcp-urg
pbr-down-action-override filter-action
sticky-dest hold-time-up
sticky-dest no-hold-time-up
group-inserted-entries application application location location
renum old-entry-id new-entry-id
scope {exclusive | template | embedded | system}
— no scope
shared-radius-filter-wmark low low-watermark high high-watermark
sub-insert-credit-control start-entry entry-id count count
sub-insert-radius start-entry entry-id count count
sub-insert-shared-pccrule start-entry entry-id count count
sub-insert-shared-radius start-entry entry-id count count
sub-insert-wmark low low-watermark high high-watermark
type {normal | src-mac | packet-length| destination-class}

4.4.1.2. IPv6 Filter Policy Commands

config
— filter
ipv6-exception exception-id [name exception-name] [create]
— no ipv6-exception {exception-id | exception-name}
description description-string
entry entry-id [create]
— no entry entry-id
description description-string
match [next-header next-header]
— no match
dst-ip {ipv6-address/prefix-length | ipv6-address ipv6-address-mask | ipv6-prefix-list prefix-list-name}
— no dst-ip
dst-port {lt | gt | eq} dst-port-number
dst-port port-list port-list-name
dst-port range dst-port-number dst-port-number
— no dst-port
-code -code
— no -code
-type -type
— no -type
port {lt | gt | eq} port-number
port port-list port-list-name
port range port-number port-number
— no port
src-ip {ipv6-address/prefix-length | ipv6-address ipv6-address-mask | ipv6-prefix-list prefix-list-name}
— no src-ip
src-port {lt | gt | eq} src-port-number
src-port port-list port-list-name
src-port range src-port-number src-port-number
— no src-port
renum old-entry-id new-entry-id
ipv6-filter filter-id [name filter-name] [create]
— no ipv6-filter {filter-id | filter-name}
default-action {drop | forward}
description description-string
embed-filter ipv6-filter-id [offset offset] [{active | inactive}]
— no embed-filter ipv6-filter-id
embed-filter flowspec [group group-id] [router {router-instance | service-name vprn-service-name}] [offset offset] [{active | inactive}]
— no embed-filter flowspec [group group-id]
embed-filter open-flow ofs-name [{system | service {service-id | service-name} | sap sap-id}] [offset offset] [{active | inactive}]
— no embed-filter open-flow ofs-name [{system | service {service-id | service-name} | sap sap-id}]
embed-filter vsd vsd-filter-id [offset offset] [{active | inactive}]
— no embed-filter vsd vsd-filter-id
entry entry-id [create]
— no entry entry-id
[no] action [secondary]
drop
drop hop-limit {lt | gt | eq} hop-limit-value
drop hop-limit range hop-limit-value hop-limit-value
drop pattern expression expression mask mask offset-type offset-type offset-value offset-value
drop payload-length {lt | gt | eq} payload-length-value
drop payload-length range payload-length-value payload-length-value
remark dscp dscp-name
fc fc-name
— no fc
forward bonding-connection connection-id
forward esi esi sf-ip ipv6-address vas-interface interface-name router router-instance
forward esi esi sf-ip ipv6-address vas-interface interface-name router service-name service-name
forward esi esi service-id vpls-service-id
forward gre-tunnel gre-tunnel-name
forward lsp lsp-name
forward mpls-policy ipv6-address
forward next-hop ipv6-address
forward next-hop ipv6-address router router-instance
forward next-hop ipv6-address router service-name service-name
forward next-hop indirect ipv6-address
forward next-hop indirect ipv6-address router router-instance
forward next-hop indirect ipv6-address router service-name service-name
forward redirect-policy policy-name
forward router router-instance
forward router service-name service-name
forward sap sap-id
forward sdp sdp-id:vc-id
forward srte-policy ipv6-address color color-id
forward vprn-target bgp-nh ip-address router router-instance [adv-prefix ipv6-address/prefix-length] [lsp lsp-name]
forward vprn-target bgp-nh ip-address router service-name service-name [adv-prefix ipv6-address/prefix-length] [lsp lsp-name]
forward-when pattern expression expression mask mask offset-type offset-type offset-value offset-value
http-redirect rdr-url-string [allow-radius-override]
nat nat-type nat-type [nat-policy nat-policy-name]
rate-limit value
rate-limit value hop-limit {lt | gt | eq} hop-limit-value
rate-limit value hop-limit range hop-limit-value hop-limit-value
rate-limit value pattern expression pattern expression mask mask offset-type offset-type offset-value offset-value
rate-limit value payload-length {lt | gt | eq} payload-length-value
rate-limit value payload-length range payload-length-value payload-length-value
remark dscp dscp-name
description description-string
egress-pbr {default-load-balancing | l4-load-balancing}
— no egress-pbr
[no] filter-sample
log log-id
— no log
match [{next-header protocol-id | next-header-list protocol-list-name}]
match next-header none
— no match
ah-ext-hdr {true | false}
— no ah-ext-hdr
destination-class dest-index
dscp dscp-name
— no dscp
dst-ip {ipv6-address/prefix-length | ipv6-address ipv6-address-mask | ipv6-prefix-list prefix-list-name}
— no dst-ip
dst-port {lt | gt | eq} dst-port-number
dst-port port-list port-list-name
dst-port range dst-port-number dst-port-number
— no dst-port
esp-ext-hdr {true | false}
flow-label flow-label [mask]
— no flow-label
fragment {true | false | first-only | non-first-only}
— no fragment
hop-by-hop-opt {true | false}
-code -code
— no -code
-type -type
— no -type
packet-length {lt | gt | eq} packet-length-value
packet-length range packet-length-value packet-length-value
port {lt | gt | eq} port-number
port port-list port-list-name
port range port-number port-number
— no port
routing-type0 {true | false}
src-ip {ipv6-address/prefix-length | ipv6-address ipv6-address-mask | ipv6-prefix-list prefix-list-name}
— no src-ip
src-mac ieee-address [ieee-address-mask]
— no src-mac
src-port {lt | gt | eq} src-port-number
src-port port-list port-list-name
src-port range src-port-number src-port-number
— no src-port
tcp-ack {true | false}
— no tcp-ack
tcp-cwr {true | false}
— no tcp-cwr
tcp-ece {true | false}
— no tcp-ece
tcp-fin {true | false}
— no tcp-fin
tcp-ns {true | false}
— no tcp-ns
tcp-psh {true | false}
— no tcp-psh
tcp-rst {true | false}
— no tcp-rst
tcp-syn {true | false}
— no tcp-syn
tcp-urg {true | false}
— no tcp-urg
pbr-down-action-override filter-action
sticky-dest hold-time-up
sticky-dest no-hold-time-up
group-inserted-entries application application location location
renum old-entry-id new-entry-id
scope {exclusive | template | embedded | system}
— no scope
shared-radius-filter-wmark low low-watermark high high-watermark
sub-insert-credit-control start-entry entry-id count count
sub-insert-radius start-entry entry-id count count
sub-insert-shared-pccrule start-entry entry-id count count
sub-insert-shared-radius start-entry entry-id count count
sub-insert-wmark low low-watermark high high-watermark
type {normal | src-mac | packet-length| destination-class}

4.4.1.3. MAC Filter Commands

config
— filter
mac-filter filter-id [name filter-name] [create]
— no mac-filter {filter-id | filter-name}
default-action {drop | forward}
description description-string
embed-filter vsd vsd-filter-id [offset offset] [{active | inactive}]
— no embed-filter vsd vsd-filter-id
entry entry-id [create]
— no entry entry-id
[no] action [secondary]
drop
forward esi esi service-id vpls-service-id
forward sap sap-id
forward sdp sdp-id:vc-id
rate-limit value
description description-string
log log-id
— no log
match [frame-type {802dot3 | 802dot2-llc | 802dot2-snap | ethernet_II}]
— no match
dot1p dot1p-value [dot1p-mask]
— no dot1p
dsap dsap-value [dsap-mask]
— no dsap
dst-mac ieee-address [ieee-address-mask]
— no dst-mac
etype 0x0600..0xffff
— no etype
inner-tag value [vid-mask]
— no inner-tag
isid value [to higher-value]
— no isid
outer-tag value [vid-mask]
— no outer-tag
snap-oui {zero | non-zero}
— no snap-oui
snap-pid snap-pid
— no snap-pid
src-mac ieee-address [ieee-address-mask]
— no src-mac
ssap ssap-value [ssap-mask]
— no ssap
pbr-down-action-override filter-action
sticky-dest hold-time-up
sticky-dest no-hold-time-up
renum old-entry-id new-entry-id
scope {exclusive | template}
— no scope
type filter-type

4.4.1.4. GRE Tunnel Template Configuration Commands

config
— filter
gre-tunnel-template name [create]
description description-string
ipv4
[no] destination-address ip-address
gre-key if-index
— no gre-key
source-address ip-address

4.4.1.5. System Filter Policy Commands

config
— filter
[no] ip ip-filter-id
[no] ipv6 ipv6-filter-id

4.4.1.6. Redirect Policy Configuration Commands

config
— filter
redirect-policy redirect-policy-name [create]
— no redirect-policy redirect-policy-name
description description-string
destination ip-address [create]
— no destination ip-address
description description-string
[no] ping-test
drop-count consecutive-failures [hold-down seconds]
— no drop-count
interval [seconds]
— no interval
source-address [ip-address]
timeout [seconds]
— no timeout
priority [priority]
— no priority
[no] shutdown
router router-instance
router service-name service-name
— no router
[no] shutdown
sticky-dest hold-time-up
sticky-dest no-hold-time-up
redirect-policy-binding name [create]
binding-operator {and | or}
redirect-policy redirect-policy-name destination ip-address
— no redirect-policy redirect-policy-name [destination ip-address]

4.4.1.7. Match Filter List Commands

config
— filter
ip-prefix-list ip-prefix-list-name [create]
— no ip-prefix-list ip-prefix-list-name
[no] apply-path
bgp-peers criterion-index group reg-exp neighbor reg-exp
bgp-peers criterion-index router router-instance group reg-exp neighbor reg-exp
bgp-peers criterion-index router service-name service-name group reg-exp neighbor reg-exp
— no bgp-peers criterion-index
description description-string
[no] prefix ip-prefix/prefix-length
[no] prefix-exclude ip-prefix/prefix-length
ipv6-prefix-list ipv6-prefix-list-name [create]
— no ipv6-prefix-list ipv6-prefix-list-name
[no] apply-path
bgp-peers criterion-index group reg-exp neighbor reg-exp
bgp-peers criterion-index router router-instance group reg-exp neighbor reg-exp
bgp-peers criterion-index router service-name service-name group reg-exp neighbor reg-exp
— no bgp-peers criterion-index
description description-string
[no] prefix ipv6-prefix/prefix-length
[no] prefix-exclude ipv6-prefix/prefix-length
port-list port-list-name [create]
— no port-list port-list-name
description description-string
[no] port port-number
[no] port range start end
protocol-list protocol-list-name [create]
— no protocol-list protocol-list-name
description description-string
[no] protocol protocol-id

4.4.1.8. Log Filter Commands

config
— filter
log log-id [create]
— no log log-id
description description-string
destination memory num-entries
destination syslog syslog-id
[no] shutdown
[no] shutdown
summary-crit dst-addr
summary-crit src-addr
[no] wrap-around

4.4.1.9. Copy Filter Commands

config
— filter
copy
ip-filter src-filter-id [src-entry src-entry-id] to dst-filter-id [dst-entry dst-entry-id] [overwrite]
ipv6-filter src-filter-id [src-entry src-entry-id] to dst-filter-id [dst-entry dst-entry-id] [overwrite]
mac-filter src-filter-id [src-entry src-entry-id] to dst-filter-id [dst-entry dst-entry-id] [overwrite]

4.4.1.10. Model-Driven Automatic ID Commands

config
— filter
filter-id-range start filter-id end filter-id

4.4.2. Command Descriptions

4.4.2.1. Generic Commands

description

Syntax 
description description-string
no description
Context 
config>filter>gre-tun-tmp
config>filter>ip-exception
config>filter>ip-exception>entry
config>filter>ip-filter
config>filter>ip-filter>entry
config>filter>ipv6-filter
config>filter>ipv6-filter>entry
config>filter>ipv6-exception
config>filter>ipv6-exception>entry
config>filter>log
config>filter>mac-filter
config>filter>mac-filter>entry
config>filter>redirect-policy
config>filter>redirect-policy>destination
config>filter>match-list>ip-prefix-list
config>filter>match-list>ipv6-prefix-list
config>filter>match-list>port-list
config>filter>match-list>protocol-list
Description 

This command creates a text description stored in the configuration file for a configuration context.

The no form of the command removes any description string from the context.

Default 

no description

Parameters 
description-string—
The description character string. Allowed values are any string up to 80 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, and so on), the entire string must be enclosed within double quotes.

4.4.2.2. IPv4 Filter Policy Commands

ip-exception

Syntax 
ip-exception filter-id [create]
no ip-exception filter-id
Context 
config>filter
Description 

This command creates a configuration context for the specified IPv4 exception filter.

The no form of the command deletes the IPv4 exception filter.

Parameters 
filter-id—
Specifies the IPv4 filter policy ID expressed as a decimal integer.
Values—
1 to 65535

 

create—
This keyword is required to create the configuration context. Once it is created, the context can be enabled with or without the create keyword.

ip-filter

Syntax 
ip-filter filter-id [name ] [create]
no ip-filter {filter-id | filter-name}
Context 
config>filter
Description 

This command creates a configuration context for the specified IPv4 filter policy.

The no form of the command deletes the IPv4 filter policy. A filter policy cannot be deleted until it is removed from all objects where it is applied.

Default 

No IPv4 filter policy is created by default.

Parameters 
filter-id—
Specifies the IPv4 filter policy ID expressed as a decimal integer.
Values—
1 to 65535

 

name
Configures an optional filter name, up to 64 characters in length, to a given filter. This filter name can then be used in configuration references, display, and show commands throughout the system. A defined filter name can help the service provider or administrator to identify and manage filters within the SR OS platforms.

To create a filter, you must assign a filter ID, however, after it is created, either the filter ID or filter name can be used to identify and reference a filter.

If a name is not specified at creation time, then SR OS assigns a string version of the filter-id as the name.

Filter names may not begin with an integer (0 to 9).

Values—
name: 64 characters maximum

 

filter-name—
Specifies a string of up to 64 characters uniquely identifying this IPv4 filter policy.
create—
This keyword is required to create the configuration context. Once it is created, the context can be enabled with or without the create keyword.

chain-to-system-filter

Syntax 
[no] chain-to-system-filter
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command chains this filter to a currently active system filter. When the filter is chained to the system filter, the system filter rules are executed first, and the filter rules are only evaluated if no match on the system filter was found.

The no form of the command detaches this filter from the system filter.

Operational note:

If no system filter is currently active, the command has no effect.

Default 

no chain-to-system-filter

default-action

Syntax 
default-action {drop | forward}
Context 
config>filter>ip-filter
config>filter>ipv6-filter
config>filter>mac-filter
Description 

This command defines the default action to be applied to packets not matching any entry in this ACL filter policy or to packets for that match a PBF/PBR filter entry for which the PBF/PBR target is down and pbr-down-action-override per-entry is set to filter-default-action.

Default 

default-action drop

Parameters 
drop—
Specifies the default action is to drop a packet.
forward—
Specifies the default action is to forward a packet.

embed-filter

Syntax 
IPv4:
embed-filter ip-filter-id [offset offset] [{active | inactive}]
no embed-filter ip-filter-id
IPv6:
embed-filter ipv6-filter-id [offset offset] [{active | inactive}]
no embed-filter ipv6-filter-id
IPv4:
embed-filter flowspec [group group-id] [router {router-instance | service-name vprn-service-name}] [offset offset] [{active | inactive}]
no embed-filter flowspec [group group-id]
embed-filter open-flow ofs-name [{system |service {service-id | service-name} | sap sap-id}] [offset offset] [{active | inactive}]
no embed-filter open-flow ofs-name [{system | service {service-id | service-name} | sap sap-id}]
embed-filter vsd vsd-filter-id [offset offset] [{active | inactive}]
no embed-filter vsd vsd-filter-id
Context 
config>filter>ip-filter
config>filter>ipv6-filter
config>filter>mac-filter
Description 

This command embeds a previously defined IPv4, IPv6, or MAC embedded filter policy or Hybrid OpenFlow switch instance into this exclusive, template, or system filter policy at the specified offset value. Rules derived from the BGP FlowSpec can also be embedded into template filter policies only.

Note:

For MAC filters, embedding is supported for VSD filters or filter entries only.

The embed-filter open-flow ofs-name form of this command enables OpenFlow (OF) in GRT either by embedding the specified OpenFlow switch (OFS) instance with switch-defined-cookie disabled, or by embedding rules with sros-cookie:type “grt-cookie”, value 0, from the specified OFS instance with switch-defined-cookie enabled. The embedding filter can only be deployed in GRT context or be unassigned.

The embed-filter open-flow ofs-name system form of this command enables OF in system filters by embedding rules with sros-cookie:type “system-cookie”, value 0, from the specified OFS instance with switch-defined-cookie enabled. The embedding filter can only be of scope system.

The embed-filter open-flow ofs-name service {service-id | service-name} form of this command enables OF in VPRN/VPLS filters by embedding rules with sros-cookie:type “service-cookie”, value service-id, from the specified OFS instance with switch-defined-cookie enabled—per service rules. The embedding filter can only be deployed in the specified VPRN/VPLS service. A single VPLS service can only support OF rules per SAP or per service.

The embed-filter open-flow ofs-name sap sap-id form of this command enables OF in VPLS SAP filters by embedding rules with sros-cookie:type “service-cookie”, value service-id and flow match conditions specifying the sap-id from the specified OFS instance with switch-defined-cookie enabled—per SAP OF rules. The embedding filter must be of type exclusive and can only be deployed on the specified SAP in the context of the specified VPLS service. A single VPLS service can only support OF rules per SAP or per service.

The no embed-filter open-flow ofs-name form of this command removes the OF embedding for the GRT context.

The embed-filter flowspec form of this command enables the embedding of rules derived from BGP FlowSpec routes into the filter policy that is being configured. The optional group parameter specifies that only FlowSpec routes tagged with an interface-set extended community containing this group ID should be selected for embedding. The optional router parameter specifies the routing instance source of the BGP FlowSpec routes; if the parameter is not specified, the routing instance is derived automatically from the context in which the filter policy is applied. FlowSpec rules associated with one routing instance cannot be embedded in a filter applied to an interface of a different routing instance. After FlowSpec rules associated with one routing instance are embedded into a filter, that filter policy cannot be applied to an interface of a different routing instance.

The no embed-filter flowspec form of this command removes the FlowSpec filter embedding from this filter policy.

The embed-filter vsd vsd-filter-id command refers to the VSD filter ID encoded _tmnx_vsd_filter-id. The filter is created dynamically and managed exclusively using the Python script, so rules can be inserted and removed in the correct VSD filters. The command is supported with IP, IPv6, and MAC filters. For more information about VSD filter provisioning, automation, and the Python script, refer to the 7450 ESS, 7750 SR, 7950 XRS, and VSR Layer 2 Services and EVPN Guide: VLL, VPLS, PBB, and EVPN.

The no embed-filter vsd vsd-filter-id form of this command removes the VSD filter embedding from this filter policy.

The no embed-filter filter-id form of this command removes the embedding from this filter policy.

See the description of embedded filter policies in this guide for further operational details.

Parameters 
IPv4: ip-filter-id—
Specifies a previously defined IPv4 policy for embedding in this filter.
IPv6: ipv6-filter-id—
Specifies a previously defined IPv6 policy for embedding in this filter.
offset —
Specifies that an embedded filter entry X will have an entry X + offset in the embedding filter.
Values—
0 to 2097151

 

Default—
0
active—
Specifies that embedded filter entries are to be included in this embedding filter policy and activated on applicable line cards—default if no keyword is specified and omitted from info command output (but not info detail), or when saving the configuration.
inactive—
Specifies that no embedded filter policy entries are to be included in this embedding filter policy. The embedding is configured but will not do anything.
flowspec—
This keyword indicates that rules derived from BGP FlowSpec routes should be embedded into (or removed from, in case of the no form) the filter.
group-id—
Specifies that only FlowSpec routes with an interface-set extended community with this value of group-id should be selected for embedding.
Values—
0 to 16383

 

router-instance—
Specifies a router instance.
vprn-service-name—
Specifies the VPRN service name used for embedding FlowSpec rules.
open-flow—
Indicates that rules derived from OpenFlow should be embedded into (or removed from, in case of the no form) the filter.
ofs-name—
Specifies the name of the currently configured Hybrid OpenFlow Switch (OFS) instance.

Not including the system, service or sap parameters will specify OF in a GRT instance context by default. This allows embedding of OF rules into filters deployed in GRT instances from OFS with switch-defined-cookie disabled, or embedding rules from OFS with switch-defined-cookie enabled, when the FlowTable cookie encodes sros-cookie:type “grt-cookie”.

system—
Used for OF control of system filters. Allows embedding of OF rules into system filters from OFS with switch-defined-cookie enabled. Only the rules with cookie value encoding “system-cookie” are embedded.
service-id—
Specifies an existing VPRN or VPLS service ID that the embedding filter can be used for.

service-name — Specifies an existing VPRN or VPLS service name that the embedding filter can be used for.

Values—
1 to 2147483647

 

service-name—
Specifies an existing VPRN or VPLS service name up to 64 characters that the embedding filter can be used for.
sap-id—
Used for OF control of VPLS services when a PortID and VLAN ID match is required. Allows embedding of OF rules with a PortID and VLAN ID match into exclusive VPLS SAP filters. Only the rules with cookie value encoding the VPLS service, and flow table match encoding the specified SAP, are embedded into the filter. The embedding filter can only be deployed in the context of the specified SAP.

sap-id — Specifies an existing SAP that the embedding filter can be used for.

vsd-filter-id
Creates an embedded filter (filter ID: _tmnx_vsd_filter-id) for population by Nuage VSD.

entry

Syntax 
entry entry-id [create]
no entry entry-id
Context 
config>filter>ip-exception
config>filter>ip-filter
config>filter>ipv6-exception
config>filter>ipv6-filter
config>filter>mac-filter
Description 

This command creates or edits an IPv4, IPv6, MAC, IP exception filter, or IPv6 exception filter entry. Multiple entries can be created using unique entry-id numbers within the filter. Entries must be sequenced from most to least explicit.

An entry may not have any match criteria defined (in which case everything matches) but must have at least the keyword action for it to be considered complete. Entries without the action keyword will be considered incomplete and hence will be rendered inactive.

The no form of the command removes the specified entry from the filter. Entries removed from the filter are immediately removed from all services or network ports where that filter is applied.

Parameters 
entry-id—
Uniquely identifies a match criteria and the corresponding action. It is recommended that multiple entries be given entry-id in staggered increments. This allows users to insert a new entry in an existing policy without requiring to renumbering all the existing entries. The parameter is expressed as a decimal integer.
Values—
1 to 2097151

 

create—
This keyword is required to create the configuration context. Once the context is created, the user can enable the context with or without the create keyword.

action

Syntax 
[no] action [secondary]
Context 
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
config>filter>mac-filter>entry
Description 

This command enters the context to configure a primary (no option specified) or secondary (secondary option specified) action to be performed on packets matching this filter entry. An ACL filter entry remains inactive (is not programmed in hardware) until a specific action is configured for that entry.

A primary action supports any filter entry action, a secondary action is used for redundancy and defines a redundant Layer 3 PBR action for an Layer 3 PBR primary action or a redundant L2 PBF action for a Layer 2 PBF primary action.

The no form of this command removes the specific action configured in the context of the action command. The primary action cannot be removed if a secondary action exists.

Default 

no action

Parameters 
secondary
Specifies a secondary action to be performed on packets matching this filter entry. A secondary action can only be configured if a primary action is configured.

drop

Syntax 
drop
drop packet-length {lt | gt | eq} packet-length-value
drop packet-length range packet-length-value packet-length-value
drop pattern expression expression mask mask offset-type offset-type offset-value offset-value
drop ttl {lt | gt | eq} ttl-value
drop ttl range ttl-value ttl-value
Context 
config>filter>ip-filter>entry>action
Description 

This command configures the drop action for the traffic that matches this filter entry.

Traffic can, also, be dropped based on pkt-length, packet-length range, ttl, ttl range, or a pattern of conditional match criteria.

Packets that match the filter entry match criteria, and not the conditional match criteria value, are implicitly forwarded with no further match in the following filter entries.

For pattern match:

  1. the expression is left-aligned for odd number bytes, for example, the expression 0xABC is programmed 0x0ABC in the line card
  1. the 'data' offset requires protocol UDP or TCP to be selected in the filter entry match criteria.
Parameters 
packet-length—
Specifies drop packets matching both the filter entry match criteria and the packet-length value defined in the drop action statement. Packets matching the filter entry match criteria and not matching the packet-length value, as defined in the drop action statement, are implicitly forwarded with no further match in the following filter entries.
Values—
lt — Specifies “less than”. The lt parameter cannot be used with the lowest possible numerical value for the parameter.
gt — Specifies “greater than”. The gt parameter cannot be used with the highest possible numerical value for the parameter.
eq — Specifies “equal to”.

 

packet-length-value—
Specifies the packet length value for the rate limit action.
Values—
0 to 65535

 

range —
Specifies an inclusive range. When range is used, the start of the range (the first value entered) must be smaller than the end of the range (the second value entered).
expression—
Specifies the hexadecimal pattern to match; up to eight bytes.
Values—
0x0000000000000001 to 0xffffffffffffffff

 

mask —
Specifies the mask for the pattern expression, up to eight bytes.
Values—
0x0000000000000001 to 0xffffffffffffffff

 

offset-type —
Specifies the starting point reference for the offset-value of this pattern.
Values—
layer-3, layer-4, data, dns-qtype

 

offset-value —
Specifies the offset value for the pattern expression. Dns-qtype supports offset value of 0.
Values—
0 to 255

 

ttl-value
Specifies drop packets matching both the filter entry match criteria and the TTL value defined in the drop action statement. Packets matching the filter entry match criteria and not matching the TTL value, as defined in the drop action statement, are implicitly forwarded with no further match in the following filter entries.
Values—
0 to 255

 

drop-extracted-traffic

Syntax 
drop-extracted-traffic
Context 
config>filter>ip-filter>entry>action
config>filter>ipv6-filter>entry>action
Description 

This command specifies that a packet matching this filter entry is dropped if extracted to the CPM. Packets matching the filter entry match criteria and not extracted to the CPM are forwarded with no further match in the following filter entries.

extended-action

Syntax 
[no] extended-action
Context 
config>filter>ip-filter>entry>action
config>filter>ipv6-filter>entry>action
Description 

This command enables the context to configure an extended action for a filter entry's PBR action (configured under config>filter>ip-filter>entry>action and config>filter>ipv6-filter>entry>action contexts). The extended action is executed in addition to the configured PBR action.

The no form of the command removes the extended action.

Default 

no extended-action

remark

Syntax 
remark dscp dscp-name
Context 
config>filter>ip-filter>entry>action
config>filter>ipv6-filter>entry>action
config>filter>ip-filter>entry>action>extended-action
config>filter>ipv6-filter>entry>action>extended-action
Description 

This command enables and configures the remarking of the DiffServ Code Points of packets matching the criteria of the IPv4/IPv6 filter policy entry, in conjunction with a PBR action. Packets are remarked regardless of QoS-based in-profile or out-of-profile classification. QoS-based DSCP remarking is overridden. If the status of the PBR target is tracked and it is down, the extended action will not be executed; otherwise, the extended action will be performed.

Parameters 
dscp-name—
Specifies the DSCP value to write.
Values—
be, ef, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cp9, cs1, cs2, cs3, cs4, cs5, nc1, nc2, af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, cp11, cp13, cp15, cp17, cp19, cp21, cp23, cp25, cp27, cp29, cp31, cp33, cp35, cp37, cp39, cp41, cp42, cp43, cp44, cp45, cp47, cp49, cp50, cp51, cp52, cp53, cp54, cp55, cp57, cp58, cp59, cp60, cp61, cp62, cp63

 

fc

Syntax 
fc fc-name
no fc
Context 
config>filter>ip-filter>entry>action
config>filter>ipv6-filter>entry>action
Description 

This command assigns a forwarding class to packets matching the filter entry.

The no version of this command removes the forwarding class marking action.

Parameters 
fc-name—
Specifies the forwarding class name.
Values—
be, l2, af, l1, h2, ef, h1, nc

 

forward

Syntax 
forward
forward bonding-connection connection-id
IPv4: forward esi esi sf-ip ip-address vas-interface interface-name router router-instance
IPv6: forward esi esi sf-ip ipv6-address vas-interface interface-name router router-instance
IPv4: forward esi esi sf-ip ip-address vas-interface interface-name router service-name service-name
IPv6: forward esi esi sf-ip ipv6-address vas-interface interface-name router service-name service-name
forward esi esi service-id vpls-service-id
forward gre-tunnel gre-tunnel-name
forward lsp lsp-name
IPv4: forward mpls-policy ip-address
IPv6: forward mpls-policy ipv6-address
IPv4: forward next-hop ip-address
IPv6: forward next-hop ipv6-address
IPv4: forward next-hop ip-address router router-instance
IPv6: forward next-hop ipv6-address router router-instance
IPv4: forward next-hop ip-address router service-name service-name
IPv6: forward next-hop ipv6-address router service-name service-name
IPv4: forward next-hop indirect ip-address
IPv6: forward next-hop indirect ipv6-address
IPv4: forward next-hop indirect ip-address router router-instance
IPv6: forward next-hop indirect ipv6-address router router-instance
IPv4: forward next-hop indirect ip-address router service-name service-name
IPv6: forward next-hop indirect ipv6-address router service-name service-name
forward next-hop interface ip-int-name
forward redirect-policy policy-name
forward router router-instance
forward router service-name service-name
forward sap sap-id
forward sdp sdp-id:vc-id
IPv4: forward srte-policy ip-address color color-id
IPv6: forward srte-policy ipv6-address color color-id
IPv4: forward vprn-target bgp-nh ip-address router router-instance [adv-prefix ip-address/mask] [lsp lsp-name]
IPv6: forward vprn-target bgp-nh ip-address router router-instance [adv-prefix ipv6-address/prefix-length] [lsp lsp-name]
IPv4: forward vprn-target bgp-nh ip-address router service-name service-name [adv-prefix ip-address/mask] [lsp lsp-name]
IPv6: forward vprn-target bgp-nh ip-address router service-name service-name [adv-prefix ipv6-address/prefix-length] [lsp lsp-name]
Context 
config>filter>ip-filter>entry>action
config>filter>ipv6-filter>entry>action
Description 

This command sets the context for specific forward commands to be performed.

Parameters 
connection-id
Specifies that the packet should be forwarded over the specified connection (specified by the connection ID under the bonding group interface), if that connect is available. Outside of a bonding egress context, the behavior of this filter is undefined.
Values—
1, 2

 

esi service-id—
Specifies that the packet matching the entry is forwarded to an ESI-identified first appliance in Nuage service chain using EVPN-resolved VXLAN tunnel in the specified VPLS service.
esi sf-ip vas-interface router—
Specifies that the packet matching the entry is forwarded to ESI/SF-IP identified first appliance in Nuage service chain using EVPN-resolved VXLAN tunnel over the configured VAS interface in the specified VPRN service.
gre-tunnel-name—
Specifies the GRE tunnel name up to 32 characters.
lsp—
Specifies that the packet matching the entry is forwarded using the specified lsp.
mpls-policy—
Specifies the redirection of the traffic to the programed instance of the MPLS FP specified by its endpoint IPv4 or IPv6 address. The behavior results in a simple forward if no policy exists, if no instance is programmed, and if the policy or instance is administratively down.
next-hop—
Specifies that the packet matching the entry is forwarded in the routing context of the incoming interface using direct or indirect IPv4 address in the routing lookup.
next-hop router—
Specifies that the packet matching the entry is forwarded in the configured routing context using direct or indirect IPv4 address in the routing lookup.
next-hop interface—
Specifies that the packet matching the entry is forwarded using the configured local interface.
redirect-policy—
Specifies that the packet matching the entry is forwarded using forward next-hop or forward next hop router and the IP address of destination selected by the configured redirect policy.If no destination is selected, packets are subject to action forward.
router—
Specifies that the packet matching the entry is routed in the configured routing instance and not in the incoming interface routing instance.
sap—
Specifies that the packet matching the entry is forwarded using the configured SAP.
sdp—
Specifies that the packet matching the entry is forwarded using the configured SDP.
srte-policy—
Specifies the redirection of the traffic to the programed instance of the SR-TE policy specified by its endpoint IPv4 address or IPv6 address and color. The behavior results in a simple forward if no policy exists, if no instance is programmed, and if the policy or instance is administratively down.
color-id—
Specifies the color identifier of the specified SR-TE policy.
Values—
0 to 4294967295

 

vprn-target—
Specifies that the packet matching the entry is redirected towards a designated BGP next-hop (bgp-nh). The user may specify an LSP (lsp lsp-name) to use towards that next-hop. If no LSP is specified, the system will automatically select one. The user must specify the routing context (router {router-instance | service-name service-name}) in which the system will perform the lookups in order to derive the proper VPRN service label. The user may specify an advertised prefix route (adv-prefix ip-address/prefix-length). This is needed in case label per VRF is not the label allocation method configured at the BGP peer.
esi—
Specifies a 10-byte Ethernet Segment Identifier.
ip-address/mask —
Specifies an IPv4 advertised route in the CIDR notation. The IPv4 address is in dotted decimal notation.
Values—
ip-address a.b.c.d (host bits must be 0)
mask: 0 to 32

 

ipv6-address/prefix-length —
Specifies an IPv6 advertised route in the CIDR notation.
Values—
ipv6-address:
  1. x:x:x:x:x:x:x:x (eight 16-bit pieces)
  2. x:x:x:x:x:x:d.d.d.d, where “x” is [0..FFFF]H, and “d” is [0..255]
prefix-length: 0 to 128

 

bgp-nh ip-address—
Specifies the IPv4 address (in dotted decimal notation) of the target BGP next-hop.
Values—
ip-address d.d.d.d

 

ip-address—
Specifies the IPv4 address of a direct or indirect next hop to which to forward matching packets.
ipv6-address—
Specifies the IPv6 address of a direct or indirect next hop to which to forward matching packets.
ip-int-name—
Specifies the name of an egress IP interface where matching packets will be forwarded from. This parameter is only valid for unnumbered point-to-point interfaces. If the string contains special characters (such as #, $, spaces), the entire string must be enclosed within double quotes.
interface-name—
Specifies the (maximum 32-character) name of an egress R-VPLS IP interface used to forward the packets using ESI redirect for VPRN/IES service.
lsp-name—
Specifies an existing RSVP-TE, MPLS-TP, or SR-TE LSP that supports LSP redirect.
policy-name—
Specifies an IPv4 redirect policy configured in the config>filter>redirect-policy context.
sap-id—
Specifies an existing VPLS Ethernet SAP.
sdp-id:vc-id —
Specifies an existing VPLS SDP.
router-instance—
Specifies “Base” or an existing VPRN service ID. For the forward vprn-target bgp-nh command, router-instance must specify an existing VPRN service ID.
service-name—
Specifies an existing VPRN service name.
vpls-service-id—
Specifies an existing VPLS service ID or service name.

forward-when

Syntax 
forward-when pattern expression expression mask mask offset-type offset-type offset-value offset-value
Context 
config>filter>ip-filter>entry>action
config>filter>ipv6-filter>entry>action
Description 

This command configures the forward-when action for the traffic that matches this filter entry.

Parameters 
pattern—
Specifies the traffic that can be forwarded based on a pattern found in the packet header or data payload.
expression —
Specifies the hexadecimal pattern to match, up to eight bytes.
Values—
0x0000000000000000 to 0xffffffffffffffff

 

mask —
Specifies the mask for the pattern expression, up to eight bytes.
Values—
0x0000000000000000 to 0xffffffffffffffff

 

offset-type—
Specifies the starting point reference for the offset-value of this pattern.
Values—
layer-3, layer-4, data, dns-qtype

 

offset-value—
Specifies the offset value for the pattern expression.
Values—
0 to 255

 

gtp-local-breakout

Syntax 
gtp-local-breakout
Context 
config>filter>ip-filter>entry
Description 

This command specifies the filter entry action to gtp-local-breakout.

http-redirect

Syntax 
http-redirect rdr-url-string [allow-radius-override]
Context 
config>filter>ip-filter>entry>action
config>filter>ipv6-filter>entry>action
Description 

This command sets the filter entry action to http-redirect.

ignore-match

Syntax 
ignore-match
Context 
config>filter>ip-filter>entry>action
config>filter>ipv6-filter>entry>action
config>filter>mac-filter>entry>action
Description 

This command sets the filter entry action to ignore-match, as a result this filter entry is ignored and not programmed in hardware.

l2-aware-nat-bypass

Syntax 
[no] l2-aware-nat-bypass
Context 
config>filter>ip-filter>entry>action
Description 

This command enables bypassing NAT for packets pertaining to L2-Aware hosts and matching this entry. This action is only applicable to L2-Aware NAT subscribers and it must be configured together with action forward. Traffic identified in the match condition bypasses L2-Aware NAT. A common use case is to bypass NAT for on-net destinations (within the customer network).

Traffic that is not classified for bypass is automatically diverted to L2-Aware NAT, unless it is explicitly configured in the IP filter to be dropped.

For selective NAT bypass to take effect, in addition to the IP filter configuration, the L2-Aware NAT subscriber must be specifically enabled for selective bypass via the allow-bypass configuration option in the NAT CLI node in the SLA profile.

The no form of this command automatically diverts traffic to L2-Aware NAT, unless it is explicitly configured in the IP filter to be dropped.

nat

Syntax 
nat [nat-policy nat-policy-name]
Context 
config>filter>ip-filter>entry>action
config>filter>ipv6-filter>entry>action
Description 

This command enables NAT traffic diversion based on IPv4 filters (LSN44) or IPv6 filters (DS-Lite, NAT64). The filter contains a matching condition based on any combination of the 5 tuple. Traffic is diverted to NAT based on such defined matching condition. Filter fields outside of the 5 tuples are not valid and it will be ignored in filter based traffic diversion to NAT.

The pool selection for the outside IP address and port along with other mapping characteristics can be specified by the means on the NAT policy.

Parameters 
nat-policy-name—
Specifies the NAT policy name, up to 32 characters.

rate-limit

Syntax 
rate-limit value
rate-limit value packet-length {lt | gt | eq} packet-length-value
rate-limit value packet-length range packet-length-value packet-length-value
rate-limit value pattern expression expression mask mask offset-type offset-type offset-value offset-value
rate-limit value ttl {lt | gt | eq} ttl-value
rate-limit value ttl range ttl-value ttl-value
Context 
config>filter>ip-filter>entry>action
config>filter>mac-filter>entry>action
Description 

This command sets the rate limit value for traffic matching this filter entry.

Traffic can, also, be rate-limited based on pkt-length, packet-length range, ttl, ttl range, or a pattern of conditional match criteria.

Packets that match the filter entry match criteria, but do not match the conditional match criteria value, are implicitly forwarded with no further match in the following filter entries.

For pattern match:

  1. the expression is left-aligned for the odd number bytes, for example, the expression 0xABC is programmed 0x0ABC in the line card
  1. the 'data' offset requires protocol UDP or TCP to be selected in the filter entry match criteria.
Parameters 
value—
Specifies the rate-limit value in kb/s. A rate of 0 results in all traffic being dropped. A rate of max results in all traffic being forwarded.
Values—
0 to 2000000000 kb/s, max

 

packet-length—
Specifies rate-limit packets matching both the filter entry match criteria and the packet-length value defined in the rate-limit action statement. Packets matching the filter entry match criteria and not matching the packet-length value, as defined in the rate-limit action statement, are implicitly forwarded with no further match in the following filter entries.
Values—
lt — Specifies “less than”. The lt parameter cannot be used with the lowest possible numerical value for the parameter.
gt — Specifies “greater than”. The gt parameter cannot be used with the highest possible numerical value for the parameter.
eq — Specifies “equal to”.

 

packet-length-value—
Specifies the packet length value for the rate limit action.
Values—
0 to 65535

 

range —
Specifies an inclusive range. When range is used, the start of the range (the first value entered) must be smaller than the end of the range (the second value entered).
expression—
Specifies the hexadecimal pattern to match; up to eight bytes.
Values—
0x0000000000000001 to 0xffffffffffffffff

 

mask —
Specifies the mask for the pattern expression, up to eight bytes.
Values—
0x0000000000000001 to 0xffffffffffffffff

 

offset-type —
Specifies the starting point reference for the offset-value of this pattern.
Values—
layer-3, layer-4, data, dns-qtype

 

offset-value —
Specifies the offset value for the pattern expression. Dns-qtype supports offset value of 0.
Values—
0 to 255

 

ttl-value
Specifies rate-limit packets matching both the filter entry match criteria and the TTL value defined in the rate-limit action statement. Packets matching the filter entry match criteria and not matching the TTL value, as defined in the rate-limit action statement, are implicitly forwarded with no further match in the following filter entries.
Values—
0 to 255

 

reassemble

Syntax 
reassemble
Context 
config>filter>ip-filter>entry>action
Description 

This command sets the filter entry action to reassemble.

tcp-mss-adjust

Syntax 
tcp-mss-adjust
Context 
config>filter>ip-filter>entry>action
config>filter>ipv6-filter>entry>action
Description 

This command activates adjustment of maximum segment size (MSS) option of TCP packets matching the entry.

egress-pbr

Syntax 
egress-pbr {default-load-balancing | l4-load-balancing}
no egress-pbr
Context 
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
Description 

This command specifies that the configured PBR action is applicable to egress processing. The command should only be enabled in ACL policies used by residential subscribers. Enabling egress-pbr on filters not deployed for residential subscribers is not blocked but may lead to unexpected behavior and should be avoided.

The no form of this command removes the egress-pbr designation of the filter entry's action.

Default 

no egress-pbr

Parameters 
default-load-balancing
Sets load-balancing to the default (hash based on SA/DA of the packet).
l4-load-balancing
Includes TCP/UDP port (if available) in the hash.

filter-sample

Syntax 
[no] filter-sample
Context 
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
Description 

This command enables cflowd sampling for packets matching this filter entry.

If the cflowd is either not enabled or set to cflowd interface mode, this command is ignored.

The no form disables the cflowd sampling using this filter entry.

Default 

no filter-sample

interface-disable-sample

Syntax 
[no] interface-disable-sample
Context 
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
Description 

This command disables cflowd sampling for packets matching this filter entry, for the IP interface set to cflowd interface mode. This allows the option to not sample specific types of traffic when interface sampling is enabled.

If the cflowd is either not enabled or set to cflowd acl mode, this command is ignored.

The no form of this command enables sampling.

Default 

no interface-disable-sample

log

Syntax 
log log-id
no log
Context 
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
config>filter>mac-filter>entry
Description 

This command associates a filter log to the current filter policy entry and therefore enables logging for that filter entry.

The filter log must exist before a filter entry can be enabled to use the filter log.

The no form of the command disables logging for the filter entry.

Default 

no log

Parameters 
log-id—
Specifies the filter log ID expressed as a decimal integer.
Values—
101 to 199

 

match

Syntax 
match [protocol protocol-id]
match protocol none
no match
Context 
config>filter>ip-exception>entry
Description 

This command enables the context to enter match criteria for the filter entry. When the match criteria have been satisfied the action associated with the match criteria is executed.

A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry. More precisely, the command can be entered multiple times but this only results in modifying the protocol-id. and does not affect the underlying match criteria configuration.

The no form of the command removes all the match criteria from the filter entry and sets the protocol-id of the match command to none (keyword). As per above, match protocol none is however not equivalent to no match.

Default 

match protocol none

Parameters 
protocol-id—
Configures and IP protocol to be used as an IP filter match criterion. The protocol type, such as TCP or UDP, is identified by its respective protocol number.
Values—
protocol-number: [0..255]D
[0x0..0xFF]H
[0b0..0b11111111]B
protocol-name:0 to 255 in decimal format. Values can also be specified in hexadecimal format, in binary format, or using the following keywords:
IPv4 filter keywords: none (default), icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, ipv6-opts, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp
IP exception filter keywords: none, icmp, igmp, ospf-igp, pim, rsvp, tcp, udp, vrrp
* — udp/tcp wildcard
Table 54:  Protocol ID Descriptions 

Protocol

Protocol ID

Description

icmp

1

Internet Control Message

igmp

2

Internet Group Management

ip

4

IP in IP (encapsulation)

tcp

6

Transmission Control

egp

8

Exterior Gateway Protocol

igp

9

Any private interior gateway (used by Cisco for IGRP)

udp

17

User Datagram

rdp

27

Reliable Data Protocol

ipv6

41

IPv6

ipv6-route

43

Routing Header for IPv6

ipv6-frag

44

Fragment Header for IPv6

idrp

45

Inter-Domain Routing Protocol

rsvp

46

Reservation Protocol

gre

47

General Routing Encapsulation

ipv6-icmp

58

ICMP for IPv6

ipv6-no-nxt

59

No Next Header for IPv6

ipv6-opts

60

Destination Options for IPv6

iso-ip

80

ISO Internet Protocol

eigrp

88

EIGRP

ospf-igp

89

OSPFIGP

ether-ip

97

Ethernet-within-IP Encapsulation

encap

98

Encapsulation Header

pnni

102

PNNI over IP

pim

103

Protocol Independent Multicast

vrrp

112

Virtual Router Redundancy Protocol

l2tp

115

Layer Two Tunneling Protocol

stp

118

Spanning Tree Protocol

ptp

123

Performance Transparency Protocol

isis

124

ISIS over IPv4

crtp

126

Combat Radio Transport Protocol

crudp

127

Combat Radio User Datagram

sctp

132

Stream Control Transmission Protocol

 

match

Syntax 
match [{protocol protocol-id | protocol-list protocol-list-name}]
match protocol none
no match
Context 
config>filter>ip-filter>entry
Description 

This command enables the context to enter match criteria for the filter entry. When the match criteria have been satisfied, the action associated with the match criteria is executed.

A match context may consist of multiple match criteria, but multiple match statements cannot be created per entry. More precisely, the protocol command can be entered multiple times but this only results in modifying the protocol-id. Matching on more than one protocol can be achieved using the protocol-list match criteria in an IP filter policy.

The no form of the command removes all the match criteria from the filter entry and sets the protocol-id of the match command to none. However, match protocol none is not equivalent to no match.

Default 

match protocol none

Parameters 
protocol-id
protocol-number | protocol-name
protocol-number—
Specifies the protocol number value to be configured as a match criterion. The value can be expressed as a decimal integer, or in hexadecimal or binary format.
Values—
[0..255]D, [0x0..0xFF]H, [0b0..0b11111111]B

 

protocol-name—
Specifies the protocol name to be configured as a match criterion.
Values—
IPv4 filter keywords: none (default), icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, ipv6-opts, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp
* — udp/tcp
Table 55:  Protocol ID Descriptions 

Protocol

Protocol ID

Description

icmp

1

Internet Control Message

igmp

2

Internet Group Management

ip

4

IP in IP (encapsulation)

tcp

6

Transmission Control

egp

8

Exterior Gateway Protocol

igp

9

Any private interior gateway (used by Cisco for IGRP)

udp

17

User Datagram

rdp

27

Reliable Data Protocol

ipv6

41

IPv6

ipv6-route

43

Routing Header for IPv6

ipv6-frag

44

Fragment Header for IPv6

idrp

45

Inter-Domain Routing Protocol

rsvp

46

Reservation Protocol

gre

47

General Routing Encapsulation

ipv6-icmp

58

ICMP for IPv6

ipv6-no-nxt

59

No Next Header for IPv6

ipv6-opts

60

Destination Options for IPv6

iso-ip

80

ISO Internet Protocol

eigrp

88

EIGRP

ospf-igp

89

OSPFIGP

ether-ip

97

Ethernet-within-IP Encapsulation

encap

98

Encapsulation Header

pnni

102

PNNI over IP

pim

103

Protocol Independent Multicast

vrrp

112

Virtual Router Redundancy Protocol

l2tp

115

Layer Two Tunneling Protocol

stp

118

Spanning Tree Protocol

ptp

123

Performance Transparency Protocol

isis

124

ISIS over IPv4

crtp

126

Combat Radio Transport Protocol

crudp

127

Combat Radio User Datagram

sctp

132

Stream Control Transmission Protocol

 

protocol-list-name—
Specifies the name of the protocol list, up to 32 characters.

destination-class

Syntax 
destination-class dest-index
no destination-class
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures the BGP destination-class value match criterion. Filtering egress traffic on destination-class requires the destination-class-lookup command to be enabled on the interface that the packet ingresses on.

The no form of the command removes the destination-class value match criterion.

Default 

no destination-class

Parameters 
dest-index—
Specifies the destination index integer value.
Values—
1 to 255

 

dscp

Syntax 
dscp dscp-name
no dscp
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures a DiffServ Code Point (DSCP) name to be used as an IP filter match criterion.

The no form of the command removes the DSCP match criterion.

Default 

no dscp

Parameters 
dscp-name—
Configures a DSCP name. The DiffServ code point may only be specified by its name.
Values—
be, ef, cp1, cp2, cp3, cp4, cp5, cp6, cp7, cp9, cs1, cs2, cs3, cs4, cs5, nc1, nc2, af11, af12, af13, af21, af22, af23, af31, af32, af33, af41, af42, af43, cp11, cp13, cp15, cp17, cp19, cp21, cp23, cp25, cp27, cp29, cp31, cp33, cp35, cp37, cp39, cp41, cp42, cp43, cp44, cp45, cp47, cp49, cp50, cp51, cp52, cp53, cp54, cp55, cp57, cp58, cp59, cp60, cp61, cp62, cp63

 

dst-ip

Syntax 
IPv4:
dst-ip {ip-address/mask | ip-address ipv4-address-mask | ip-prefix-list prefix-list-name}
IPv6:
dst-ip {ipv6-address/prefix-length | ipv6-address ipv6-address-mask | ipv6-prefix-list prefix-list-name}
no dst-ip
Context 
config>filter>ip-exception>entry>match
config>filter>ip-filter>entry>match
config>filter>ipv6-exception>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures a destination address range to be used as a filter policy match criterion.

To match on the destination address, specify the address and its associated mask, e.g., 10.1.0.0/16. The conventional notation of 10.1.0.0 255.255.0.0 can also be used for IPv4.

The no form of this command removes the destination IPv4 or IPv6 address match criterion.

Default 

no dst-ip

Parameters 
ip-address—
Specifies the destination IPv4 address in dotted decimal notation.
Values—
a.b.c.d

 

mask—
Specifies the length in bits of the subnet mask.
Values—
1 to 32

 

ipv4-address-mask—
Specifies the subnet mask in dotted decimal notation.
Values—
a.b.c.d (dotted quad equivalent of mask length)

 

ip-prefix-list or ipv6-prefix-list prefix-list-name —
Specifies to use a list of IP prefixes referred to by prefix-list-name, which is a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
ipv6-address —
Specifies the IPv6 prefix for the IP match criterion in hex digits.
Values—
x:x:x:x:x:x:x:x (eight 16-bit pieces)
x:x:x:x:x:x:d.d.d.d
x: [0..FFFF]H
d: [0..255]D

 

prefix-length —
Specifies the IPv6 prefix length for the ipv6-address as a decimal integer.
Values—
1 to 128

 

ipv6-address-mask —
Specifies the eight 16-bit hexadecimal pieces representing bit match criteria.
Values—
x:x:x:x:x:x:x:x (eight 16-bit pieces)
x:x:x:x:x:x:d.d.d.d
x: [0..FFFF]H
d: [0..255]D

 

dst-port

Syntax 
dst-port {lt | gt | eq} dst-port-number
dst-port port-list port-list-name
dst-port range dst-port-number dst-port-number
no dst-port
Context 
config>filter>ip-exception>entry>match
config>filter>ip-filter>entry>match
config>filter>ipv6-exception>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures a destination TCP, UDP, or SCTP port number or port range for an IP filter or IP exception match criterion. An entry containing Layer 4 non-zero match criteria will not match non-initial (2nd, 3rd, etc) fragments of a fragmented packet since only the first fragment contains the Layer 4 information. Similarly an entry containing the “dst-port eq 0” match criterion, may match non-initial fragments when the destination port value is not present in a packet fragment and other match criteria are also met.

The no form of the command removes the destination port match criterion.

Default 

no dst-port

Parameters 
lt—
Specifies that all port numbers less than the dst-port-number match.
gt—
Specifies that all port numbers greater than the dst-port-number match.
eq—
Specifies that the dst-port-number must be an exact match.
dst-port-number—
Specifies the destination port number to be used as a match criteria expressed as a decimal integer, as well as in hexadecimal or binary format. The following value is for decimal integer format only.
Values—
0 to 65535

 

port-list-name—
Specifies to use a list of ports referred to by port-list-name, which is a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
dst-port-number dst-port-number
Specifies inclusive port range between two dst-port-number values.

fragment

Syntax 
fragment {true | false | first-only | non-first-only}
no fragment
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command specifies match criterion for fragmented packets.

Matches can be based on the presence of a fragmented packet (or otherwise) on the ingress or egress interface.

Matches can also be based on the presence of the first fragment of a packet, or on the presence of a fragment that is not the first fragment on the ingress interface.

The no form of the command removes the match criterion.

Default 

no fragment

Parameters 
true—
Specifies to match on all fragmented packets.
false—
Specifies to match on all non-fragmented packets.
first-only—
Matches if a packet is an initial fragment of a fragmented packet.
non-first-only—
Matches if a packet is a non-initial fragment of a fragmented packet.

-code

Syntax 
-code -code
no -code
Context 
config>filter>ip-exception>entry>match
config>filter>ip-filter>entry>match
config>filter>ipv6-exception>entry>match
config>filter>ipv6-filter>entry>match
Description 

Configures matching on /ICMPv6 code field in the /ICMPv6 header of an IPv4 or IPv6 packet as a filter match criterion or configures matching on the code field in the header of an IPv4 packet as an exception filter match criterion. An entry containing Layer 4 non-zero match criteria will not match non-initial (2nd, 3rd, etc.) fragments of a fragmented packet since only the first fragment contains the Layer 4 information. Similarly an entry containing "-code 0" match criterion, may match non-initial fragments when the Layer 4 header is not present in a packet fragment and other match criteria are also met.

The no form of the command removes the criterion from the match entry.

Default 

no -code

Parameters 
-code—
Specifies the /ICMPv6 code value that must be present to match. Value can be expressed as a decimal integer, as well as in hexadecimal or binary format, or even using keywords. The following value shows decimal integer only.
Values—
0 to 255

 

-type

Syntax 
-type -type
no -type
Context 
config>filter>ip-exception>entry>match
config>filter>ip-filter>entry>match
config>filter>ipv6-exception>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures matching on the /ICMPv6 type field in the /ICMPv6 header of an IPv4 or IPv6 packet as a filter match criterion or configures matching on the type field in the header of an IPv4 packet as an exception filter match criterion. An entry containing Layer 4 non-zero match criteria will not match non-initial (2nd, 3rd, etc.) fragments of a fragmented packet since only the first fragment contains the Layer 4 information. Similarly an entry containing "-type 0" match criterion, may match non-initial fragments when the Layer 4 header is not present in a packet fragment and other match criteria are also met.

The no form of the command removes the criterion from the match entry.

Default 

no -type

Parameters 
-type—
Specifies the /ICMPv6 type value that must be present to match. Value can be expressed as a decimal integer, as well as in hexadecimal or binary format, or even using keywords. The following value shows decimal integer only.
Values—
0 to 255

 

ip-option

Syntax 
ip-option ip-option-value [ip-option-mask]
no ip-option
Context 
config>filter>ip-filter>entry>match
Description 

This command configures matching packets with a specific IP option or a range of IP options in the first option of the IP header as an IP filter match criterion.

The option-type octet contains 3 fields:

1 bit copied flag (copy options in all fragments)

2 bits option class

5 bits option number

The no form of the command removes the match criterion.

Default 

no ip-option

Parameters 
ip-option-value—
Specifies the 8 bit option-type as a decimal integer, binary, or hexadecimal format. The mask is applied as an AND to the option byte, the result is compared with the option-value.

The decimal value entered for the match should be a combined value of the eight bit option type field and not just the option number. Therefore, to match on IP packets that contain the Router Alert option (option number = 20), enter the option type of 148 (10010100).

Values—
0 to 255

 

ip-option-mask—
Specifies an optional parameter that can be used when specifying a range of option numbers to use as the match criteria.

This 8 bit mask can be configured using the following formats:

Table 56:  ip-option-mask Formats 

Format Style

Format Syntax

Example

Decimal

DDD

20

Hexadecimal

0xHH

0x14

Binary

0bBBBBBBBB

0b0010100

Default—
255 (decimal) (exact match)
Values—
1 to 255 (decimal)

 

multiple-option

Syntax 
multiple-option {true | false}
no multiple-option
Context 
config>filter>ip-filter>entry>match
Description 

This command configures matching packets that contain one or more than one option fields in the IP header as an IP filter match criterion.

The no form of the command removes the checking of the number of option fields in the IP header as a match criterion.

Default 

no multiple-option

Parameters 
­true—
Specifies matching on IP packets that contain more than one option field in the header.
false—
Specifies matching on IP packets that do not contain multiple option fields present in the header.

option-present

Syntax 
option-present {true | false}
no option-present
Context 
config>filter>ip-filter>entry>match
Description 

This command configures matching packets that contain any IP options in the IP header as an IP filter match criterion.

The no form of the command removes the checking of IP options in the IP header as a match criterion.

Default 

no option-present

Parameters 
true—
Specifies matching on all IP packets that contain any IP options in the IP header. A match will occur for all packets that have any IP option present. An option field of zero is considered as no option present.
false—
Specifies matching on IP packets that do not have any IP option present in the IP header. (an option field of zero). An option field of zero is considered as no option present.

packet-length

Syntax 
packet-length {lt | gt | eq} packet-length-value
packet-length range packet-length-value packet-length-value
no packet-length
Context 
config>filter>ip-filter>entry>match
Description 

This command configures the IPv4 packet length value match criterion. The IPv4 packet length represents the total packet length including the IPv4 header and the payload.

Default 

no packet-length

Parameters 
lt—
Specifies “less than”. The lt parameter cannot be used with the lowest possible numerical value for the parameter.
gt—
Specifies “greater than”. The gt parameter cannot be used with the highest possible numerical value for the parameter.
eq—
Specifies “equal to”.
packet-length-value—
Specifies the packet length value.
Values—
0 to 65535

 

range—
Specifies an inclusive range. When range is used, the beginning of the range must have a value less than the second value of the range.

port

Syntax 
port {lt | gt | eq} port-number
port port-list port-list-name
port range port-number port-number
no port
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
config>filter>ipv6-exception>entry>match
Description 

This command configures a TCP/UDP/SCTP source or destination port match criterion in IPv4 and IPv6 CPM (SCTP not supported) and/or ACL filter policies. A packet matches this criterion if the packet TCP/UDP/SCTP (as configured by protocol/next-header match) source OR destination port matches either the specified port value or a port in the specified port range or port-list.

Operational Note: This command is mutually exclusive with src-port and dst-port commands. Configuring "port eq 0", may match non-initial fragments where the source/destination port values are not present in a packet fragment if other match criteria are also met.

The no form of this command deletes the specified port match criterion.

Default 

no port

Parameters 
lt | gt | eq—
Specifies the operator to use relative to port-number for specifying the port number match criteria.
lt—
Specifies that all port numbers less than port-number match.
gt—
Specifies that all port numbers greater than port-number match.
eq—
Specifies that the port-number must be an exact match.
port-number—
Specifies a source or destination port to be used as a match criterion. The port number can be expressed as a decimal integer, as well as in hexadecimal or binary format. The following value shows a decimal integer only.
Values—
0 to 65535

 

port-list port-list-name
Specifies an inclusive range of source or destination port values to be used as match criteria.
range port-number port-number
Specifies an inclusive range of source or destination port values to be used as match criteria.

src-ip

Syntax 
IPv4:
src-ip {ip-address/mask | ip-address ipv4-address-mask | ip-prefix-list prefix-list-name}
IPv6:
src-ip {ipv6-address/prefix-length | ipv6-address ipv6-address-mask | ipv6-prefix-list prefix-list-name}
no src-ip
Context 
config>filter>ip-exception>entry>match
config>filter>ipv6-filter>entry>match
config>filter>ipv6-exception>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures a source IPv4 or IPv6 address range to be used as an IP filter or IP exception match criterion.

To match on the source IPv4 or IPv6 address, specify the address and its associated mask, for example, 10.1.0.0/16 for IPv4. The conventional notation of 10.1.0.0 255.255.0.0 may also be used for IPv4.

The no form of the command removes the source IP address match criterion.

Default 

no src-ip

Parameters 
ip-address—
Specifies the destination IPv4 address specified in dotted decimal notation.
Values—
a.b.c.d

 

mask—
Specifies the length in bits of the subnet mask.
Values—
1 to 32

 

ipv4-address-mask—
Specifies the subnet mask in dotted decimal notation.
Values—
a.b.c.d (dotted quad equivalent of mask length)

 

ip-prefix-list or ipv6-prefix-list prefix-list-name —
Specifies to use a list of IP prefixes referred to by prefix-list-name, which is a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
ipv6-address —
Specifies an IPv6 prefix for the IP match criterion in hex digits.
Values—
x:x:x:x:x:x:x:x (eight 16-bit pieces)
x:x:x:x:x:x:d.d.d.d
x: [0..FFFF]H
d: [0..255]D

 

prefix-length —
Specifies whether a the IPv6 prefix length for the specified ipv6-address expressed as a decimal integer.
Values—
1 to 128

 

ipv6-address-mask —
Specifies eight 16-bit hexadecimal pieces representing bit match criteria.
Values—
x:x:x:x:x:x:x:x (eight 16-bit pieces)
x:x:x:x:x:x:d.d.d.d
x: [0..FFFF]H
d: [0..255]D

 

src-port

Syntax 
src-port {lt | gt | eq} src-port-number
src-port port-list port-list-name
src-port range src-port-number src-port-number
no src-port
Context 
config>filter>ip-exception>entry>match
config>filter>ip-filter>entry>match
config>filter>ipv6-exception>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures a source TCP, UDP, or SCTP port number, port range, or port match list for an IP filter or IP exception match criterion. An entry containing Layer 4 non-zero match criteria will not match non-initial (2nd, 3rd, and so on) fragments of a fragmented packet since only the first fragment contains the Layer 4 information. Similarly an entry containing "src-port eq 0" match criterion, may match non-initial fragments when the source port value is not present in a packet fragment and other match criteria are also met.

The no form of the command removes the source port match criterion.

Default 

no src-port

Parameters 
lt | gt | eq—
Specifies the operator to use relative to src-port-number for specifying the port number match criteria.

lt specifies that all port numbers less than src-port-number match.

gt specifies that all port numbers greater than src-port-number match.

eq specifies that src-port-number must be an exact match.

src-port-number—
Specifies the source port number to be used as a match criteria expressed as a decimal integer, and in hexadecimal or binary format. Below shows decimal integer only.
Values—
0 to 65535

 

port-list-name—
Specifies to use a list of ports referred to by port-list-name, which is a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.
src-port-number src-port-number
Specifies inclusive port range between two src-port-number values.

src-route-option

Syntax 
src-route-option {true | false}
no source-route-option
Context 
config>filter>ip-filter>entry>match
Description 

This command enables source route option match conditions. When enabled, this filter should match if a (strict or loose) source route option is present/not present at any location within the IP header, as per the value of this object. The no form of the command removes the criterion from the match entry.

Default 

no src-route-option

Parameters 
true—
Enables source route option match conditions.
false—
Disables source route option match conditions.

tcp-ack

Syntax 
tcp-ack {true | false}
no tcp-ack
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures an IP filter match criterion based on the Acknowledgment (ACK) TCP Flag bit, defined in RFC 793, as being set or not in the TCP header of an IP packet.

The no form of the command removes the criterion from the match entry.

Default 

no tcp-ack

Parameters 
true—
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
false—
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.

tcp-cwr

Syntax 
tcp-cwr {true | false}
no tcp-cwr
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures an IP filter match criterion based on the Congestion Window Reduced (CWR) TCP Flag bit, defined in RFC 3168, as being set or not in the TCP header of an IP packet.

The no form of the command removes the criterion from the match entry.

Default 

no tcp-cwr

Parameters 
true—
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
false—
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.

tcp-ece

Syntax 
tcp-ece {true | false}
no tcp-ece
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures an IP filter match criterion based on the ECN-Echo (ECE) TCP Flag bit, defined in RFC 3168, as being set or not in the TCP header of an IP packet.

The no form of the command removes the criterion from the match entry.

Default 

no tcp-ece

Parameters 
true—
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
false—
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.

tcp-fin

Syntax 
tcp-fin {true | false}
no tcp-fin
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures an IP filter match criterion based on the FIN TCP Flag bit, defined in RFC 793, as being set or not in the TCP header of an IP packet.

The no form of the command removes the criterion from the match entry.

Default 

no tcp-fin

Parameters 
true—
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
false—
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.

tcp-ns

Syntax 
tcp-ns {true | false}
no tcp-ns
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures an IP filter match criterion based on the Nonce Sum (NS) TCP Flag bit, defined in RFC 3540, as being set or not in the TCP header of an IP packet.

The no form of the command removes the criterion from the match entry.

Default 

no tcp-ns

Parameters 
true—
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
false—
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.

tcp-psh

Syntax 
tcp-psh {true | false}
no tcp-psh
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures an IP filter match criterion based on the Push (PSH) TCP Flag bit, defined in RFC 793, as being set or not in the TCP header of an IP packet.

The no form of the command removes the criterion from the match entry.

Default 

no tcp-psh

Parameters 
true—
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
false—
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.

tcp-rst

Syntax 
tcp-rst {true | false}
no tcp-rst
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures an IP filter match criterion based on the Reset (RST) TCP Flag bit, defined in RFC 793, as being set or not in the TCP header of an IP packet.

The no form of the command removes the criterion from the match entry.

Default 

no tcp-rst

Parameters 
true—
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
false—
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.

tcp-syn

Syntax 
tcp-syn {true | false}
no tcp-syn
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures an IP filter match criterion based on the Synchronize (SYN) TCP Flag bit, defined in RFC 793, as being set or not in the TCP header of an IP packet.

The no form of the command removes the criterion from the match entry.

Default 

no tcp-syn

Parameters 
true—
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
false—
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.

tcp-urg

Syntax 
tcp-urg {true | false}
no tcp-urg
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
Description 

This command configures an IP filter match criterion based on the Urgent (URG) TCP Flag bit, defined in RFC 793, as being set or not in the TCP header of an IP packet.

The no form of the command removes the criterion from the match entry.

Default 

no tcp-urg

Parameters 
true—
Specifies matching on IP packets that have the selected TCP flag bit set in the TCP header.
false—
Specifies matching on IP packets that do not have the selected TCP flag bit set in the TCP header.

pbr-down-action-override

Syntax 
pbr-down-action-override filter-action
no pbr-down-action-override
Context 
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
config>filter>mac-filter>entry
Description 

This command allows overriding the default action that is applied for entries with PBR/PBF action defined, when the PBR/PBF target is down.

The no form of the command preserves default behavior when PBR/PBF target is down.

Default 

no pbr-down-action-override

Parameters 
filter-action—
Specifies the packets matching the entry.

drop — Specifies that packets matching the entry will be dropped if PBR/PBF target is down.

forward — Specifies that packets matching the entry will be forwarded if PBR/PBF target is down.

filter-default-action — Specifies that packets matching the entry will be processed as per default-action configuration for this filter if PBR/PBF target is down.

sticky-dest

Syntax 
sticky-dest hold-time-up
sticky-dest no-hold-time-up
no sticky-dest
Context 
config>filter>ip-filter>entry
config>filter>ipv6-filter>entry
config>filter>mac-filter>entry
config>filter>redirect-policy
Description 

This command configures sticky destination behavior for redundant PBR/PBF actions. Configuring sticky destination has an effect on PBR/PBF actions whether a secondary action is configured.

The hold-time-up parameter allows the operator to delay programming of a PBR/PBF action for a specified amount of time. The timer is only started when transitioning from all configured targets being down (that is, the primary target if no secondary target is configured, or both the primary and secondary targets when both are configured) to at least one target being up.

When the timer expires, the primary PBR/PBF action is programmed if its target is up. If the primary PBR/PBF target is down and a secondary PBR/PBF action has been configured and its target is up, then this secondary PBR/PBF action is programmed. In all other cases, no specific programming occurs when the timer expires.

When sticky destination is configured and the secondary PBR/PBF target is up and its associated action is programmed, it is not automatically replaced by the primary PBR/PBF action when its target transitions from down to up. In this situation, programming the primary PBR/PBF action can be forced using the activate-primary-action tools command.

Changing the value of the timer while the timer is running takes effect immediately (that is, the timer is restarted immediately using the new value).

The no form of the command disables sticky destination behavior.

Default 

no sticky-dest

Parameters 
hold-time-up
Specifies the initial delay in seconds. Zero is equivalent to no-hold-time-up (no delay).
Values—
0 to 65535 seconds

 

group-inserted-entries

Syntax 
group-inserted-entries application application location location
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command groups automatically-inserted entries.

Parameters 
application—
Specifies the application for which the group entries are inserted.
Values—
radius, credit-control

 

location—
Specifies the location in the entry list in which the group entries are inserted.
Values—
top, bottom

 

renum

Syntax 
renum old-entry-id new-entry-id
Context 
config>filter>ip-exception
config>filter>ip-filter
config>filter>ipv6-exception
config>filter>ipv6-filter
config>filter>mac-filter
Description 

This command renumbers existing MAC, IPv4/IPv6, IP exception filter, or IPv6 exception filter entries to properly sequence filter entries.

This may be required in some cases since the OS exits when the first match is found and executes the actions according to the accompanying action command. This requires that entries be sequenced correctly from most to least explicit.

Parameters 
old-entry-id—
Specifies the entry number of an existing entry, as a decimal integer.
Values—
1 to 2097151

 

new-entry-id—
Specifies the new entry-number to be assigned to the old entry, as a decimal integer.
Values—
1 to 2097151

 

scope

Syntax 
scope {exclusive | template | embedded | system}
scope {exclusive | template}
no scope
Context 
config>filter>ip-exception
config>filter>ip-filter
config>filter>ipv6-filter
config>filter>mac-filter
Description 

This command configures the filter policy scope as exclusive, template, embedded or system.

The scope of the policy cannot be changed when:

  1. the scope is template and the policy is applied to one or more services or network interfaces
  2. the scope is embedded and the policy is embedded by another policy

Changing the scope to/from system is only allowed when a policy is not active and the policy has no entries configured.

The no form of the command sets the scope of the policy to the default of template.

Default 

scope template

Parameters 
exclusive—
Specifies that the policy can only be applied to a single entity. Attempting to assign the policy to a second entity will result in an error message.
template—
Specifies that the policy can be applied to multiple entities.
embedded—
Specifies that the policy cannot be applied directly. The policy defines embedded filter rules, which are embedded by other exclusive/template/system filter policies. The embedded scope is supported for IPv4 and IPv6 filter policies only.
system—
Specifies that the policy defines system-wide filter rules. To apply system policy rules, activate system filter and chain exclusive/template ACL filter policy to the system filter. The system scope is supported for IPv4 and IPv6 filter policies only.

shared-radius-filter-wmark

Syntax 
shared-radius-filter-wmark low low-watermark high high-watermark
no shared-radius-filter-wmark
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command configures the low and high watermark for the number of RADIUS shared filters reporting

Default 

no shared-radius-filter-wmark

Parameters 
low-watermark
Specifies the utilization of the filter ranges for filter entry insertion, at which a table full alarm will be raised by the agent.
Values—
0 to 8000

 

high-watermark
Specifies the utilization of the filter ranges for filter entry insertion, at which a table full alarm will be cleared by the agent.
Values—
1 to 8000

 

sub-insert-credit-control

Syntax 
sub-insert-credit-control start-entry entry-id count count
no sub-insert-credit-control
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command inserts point information for credit control for the filter.

The no form of the command reverts to the default.

Default 

no sub-insert-credit-control

Parameters 
entry-id
Identifies a filter on this system.
Values—
1 to 2097151

 

count—
Specifies the count
Values—
1 to 65535

 

sub-insert-radius

Syntax 
sub-insert-radius start-entry entry-id count count
no sub-insert-radius
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command inserts point information for RADIUS for the filter.

The no form of the command reverts to the default.

Default 

no sub-insert-radius

Parameters 
entry-id
Specifies at what place the filter entries received from RADIUS will be inserted in the filter.
Values—
1 to 2097151

 

count
Specifies the count.
Values—
1 to 65535

 

sub-insert-shared-pccrule

Syntax 
sub-insert-shared-pccrule start-entry entry-id count count
no sub-insert-shared-pccrule
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command defines the range of filter and QoS policy entries that are reserved for shared entries received in Flow-Information AVP via Gx interface (PCC rules – Policy and Charging Control). The no form of this command disables the insertion, which will result in a failure of PCC rule installation.

Default 

no sub-insert-shared-pccrule

Parameters 
entry-id
Specifies the lowest entry in the range.
Values—
1 to 2097151

 

count
Specifies the number of entries in the range.
Values—
1 to 65535

 

sub-insert-shared-radius

Syntax 
sub-insert-shared-radius start-entry entry-id count count
no sub-insert-shared-radius
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command configures the insert point for shared host rules from RADIUS.

Default 

no sub-insert-shared-radius

Parameters 
entry-id
Identifies a filter on this system.
Values—
1 to 2097151

 

count
Specifies the count.
Values—
1 to 65535

 

sub-insert-wmark

Syntax 
sub-insert-wmark low low-watermark high high-watermark
no sub-insert-wmark
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command configures the low and high watermark percentage for inserted filter entry usage reporting.

The no form of the command reverts to the default.

Default 

sub-insert-wmark low 90 high 95

Parameters 
low-watermark—
Specifies the utilization of the filter ranges for filter entry insertion, at which a table full alarm will be cleared by the agent.
Values—
0 to 100

 

high-watermark
Specifies the utilization of the filter ranges for filter entry insertion, at which a table full alarm will be raised by the agent.
Values—
0 to 100

 

type

Syntax 
type {normal | src-mac | packet-length| destination-class}
Context 
config>filter>ip-filter
config>filter>ipv6-filter
Description 

This command configures the filter policy type. The policy type defines the list of match criteria supported in a filter policy.

Default 

type normal

Parameters 
normal—
Specifies the default filter policy type.
src-mac—
Specifies the source MAC filter policy type to match on source MAC addresses in VPLS services.
packet-length—
Specifies the packet-length filter policy type to match on the total packet length.
destination-class—
Specifies the destination-class filter policy. This filter policy type is supported on egress networks, IES, VPRN, and R-VPLS interfaces.

4.4.2.3. IPv6 Filter Policy Commands

ipv6-exception

Syntax 
ipv6-exception exception-id [name exception-name] [create]
no ipv6-exception {exception-id | exception-name}
Context 
config>filter
Description 

This command creates a configuration context for the specified IPv6 exception filter.

The no form of the command deletes the IPv6 exception filter.

Parameters 
exception-id—
Specifies the IPv6 filter exception ID expressed as a decimal integer.
Values—
1 to 65535

 

name exception-name
Specifies the IPv6 filter exception as a name, up to 64 characters.
create—
This keyword is required to create the configuration context. Once it is created, the context can be enabled with or without the create keyword.

match

Syntax 
next-header next-header
no match
Context 
config>filter>ipv6-exception>entry
Description 

This command enables the context to enter match criteria for the IPv6 filter exception. When the match criteria have been satisfied, the action associated with the match criteria is executed.

The no form of the command removes all the match criteria from the IPv6 filter exception.

Parameters 
next-header
protocol-number | protocol-name
protocol-number—
The protocol number.
Values—
[1 to 42 | 45 to 49 | 52 to 59 | 61 to 255]D
[0x0 to 0x2A | 0x2D to 0x31 | 0x34 to 0x3B | 0x3D to 0xFF]H
[0b0 to 0b101010 | 0b101101 to 0b110001 | 0b110100 to 0b111011 | 0b111101 to 0b11111111]B

 

protocol-name—
The protocol name.
Values—
none, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, idrp, rsvp, gre, ipv6-, ipv6-no-nxt, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp
Where udp and tcp are wildcards.
Table 57:  Protocol Name Descriptions 

Protocol

Protocol number

Description

icmp

1

Internet Control Message

igmp

2

Internet Group Management

ip

4

IP in IP (encapsulation)

tcp

6

Transmission Control

egp

8

Exterior Gateway Protocol

igp

9

Any private interior gateway (used by Cisco for IGRP)

udp

17

User Datagram

rdp

27

Reliable Data Protocol

ipv6

41

IPv6

idrp

45

Inter-Domain Routing Protocol

rsvp

46

Reservation Protocol

gre

47

General Routing Encapsulation

ipv6-

58

for IPv6

ipv6-no-nxt

59

No Next Header for IPv6

iso-ip

80

ISO Internet Protocol

eigrp

88

EIGRP

ospf-igp

89

OSPFIGP

ether-ip

97

Ethernet-within-IP Encapsulation

encap

98

Encapsulation Header

pnni

102

PNNI over IP

pim

103

Protocol Independent Multicast

vrrp

112

Virtual Router Redundancy Protocol

l2tp

115

Layer Two Tunneling Protocol

stp

118

Spanning Tree Protocol

ptp

123

Performance Transparency Protocol

isis

124

ISIS over IPv4

crtp

126

Combat Radio Transport Protocol

crudp

127

Combat Radio User Datagram

sctp

132

Stream Control Transmission Protocol

 

ipv6-filter

Syntax 
ipv6-filter filter-id [name filter-name] [create]
no ipv6-filter {filter-id | filter-name}
Context 
config>filter
Description 

This command creates a configuration context for the specified IPv6 filter policy.

The no form of the command deletes the IPv6 filter policy. A filter policy cannot be deleted until it is removed from all objects where it is applied.

Parameters 
filter-id—
Specifies the IPv6 filter policy ID expressed as a decimal integer.
Values—
1 to 65535

 

name
Configures an optional filter name, up to 64 characters in length, to a given filter. This filter name can then be used in configuration references, display, and show commands throughout the system. A defined filter name can help the service provider or administrator to identify and manage filters within the SR OS platforms.

To create a filter, you must assign a filter ID, however, after it is created, either the filter ID or filter name can be used to identify and reference a filter.

If a name is not specified at creation time, then SR OS assigns a string version of the filter-id as the name.

Filter names may not begin with an integer (0 to 9).

Values—
name: 64 characters maximum

 

filter-name—
Specifies a string of up to 64 characters uniquely identifying this IPv6 filter policy.
create—
This keyword is required to create the configuration context. Once it is created, the context can be enabled with or without the create keyword.

drop

Syntax 
drop
drop hop-limit {lt | gt | eq} hop-limit-value
drop hop-limit range hop-limit-value hop-limit-value
drop pattern expression expression mask mask offset-type offset-type offset-value offset-value
drop payload-length {lt | gt | eq} payload-length-value
drop payload-length range payload-length-value payload-length-value
Context 
config>filter>ipv6-filter>entry>action
Description 

This command configures the drop action for the traffic that matches this filter entry.

Traffic can, also, be dropped based on payload-length, payload-length range, hop-limit, hop-limit range, or a pattern of conditional match criteria.

Packets that match the filter entry match criteria, but do not match the conditional match criteria value, are implicitly forwarded with no further match in the following filter entries.

For pattern match:

  1. the expression is left-aligned for the odd number bytes, for example, the expression 0xABC is programmed 0x0ABC in the line card
  2. the 'data' offset requires protocol UDP or TCP to be selected in the filter entry match criteria
Parameters 
hop-limit—
Specifies the hop-limit value for the drop action.
Values—
lt — Specifies “less than”. The lt parameter cannot be used with the lowest possible numerical value for the parameter.
eq — Specifies “equal to”.
gt — Specifies “greater than”. The gt parameter cannot be used with the highest possible numerical value for the parameter.

 

hop-limit-value
Specifies the hop-limit value for the drop action.
Values—
0 to 255

 

range —
Specifies an inclusive range. When the range parameter is used, the start of the range (the first value entered) must be smaller than the end of the range (the second value entered).
expression—
Specifies the hexadecimal pattern to match; up to eight bytes.
Values—
0x0000000000000001 to 0xffffffffffffffff

 

mask —
Specifies the mask for the pattern expression, up to eight bytes.
Values—
0x0000000000000001 to 0xffffffffffffffff

 

offset-type —
Specifies the starting point reference for the offset-value of this pattern.
Values—
layer-3, layer-4, data, dns-qtype

 

offset-value —
Specifies the offset value for the pattern expression. Dns-qtype supports offset value of 0.
Values—
0 to 255

 

payload-length—
Specifies drop packets matching both the filter entry match criteria and the payload-length-value defined in the drop action statement. Packets matching the filter entry match criteria and not matching the payload-length-value, as defined in the drop action statement, are implicitly forwarded with no further match in the following filter entries.
Values—
lt — Specifies “less than”. The lt parameter cannot be used with the lowest possible numerical value for the parameter.
gt — Specifies “greater than”. The gt parameter cannot be used with the highest possible numerical value for the parameter.
eq — Specifies “equal to”.

 

payload-length-value—
Specifies the payload length value for the drop action.
Values—
0 to 65535

 

nat

Syntax 
nat nat-type nat-type [nat-policy nat-policy-name]
Context 
config>filter>ipv6-filter>entry>action
Description 

This command enables NAT traffic diversion based on IPv4 filters (LSN44) or IPv6 filters (DS-Lite, NAT64). The filter contains a matching condition based on any combination of the 5 tuple. Traffic will be diverted to NAT based on such defined matching condition. Filter fields outside of the 5 tuples are not valid and it will be ignored in filter based traffic diversion to NAT.

The pool selection for the outside IP address and port along with other mapping characteristics can be specified by the means on the NAT policy.

Parameters 
nat-type—
Specifies the NAT type.
nat-policy-name—
Specifies the NAT policy name up to 32 characters.

rate-limit

Syntax 
rate-limit value
rate-limit value hop-limit {lt | gt | eq} hop-limit-value
rate-limit value hop-limit range hop-limit-value hop-limit-value
rate-limit value pattern expression expression mask mask offset-type offset-type offset-value offset-value
rate-limit value payload-length {lt | gt | eq} payload-length-value
rate-limit value payload-length range payload-length-value payload-length-value
Context 
config>filter>ipv6-filter>entry>action
Description 

This command sets the rate limit value for traffic matching this filter entry.

Traffic can, also, be rate-limited based on payload-length, payload-length range, hop-limit, hop-limit range, or a pattern of conditional match criteria.

Packets that match the filter entry match criteria, but do not match the conditional match criteria value, are implicitly forwarded with no further match in the following filter entries.

For pattern match:

  1. the expression is left-aligned for the odd number bytes, for example, the expression 0xABC is programmed 0x0ABC in the line card.
  2. the 'data' offset requires protocol UDP or TCP to be selected in the filter entry match criteria.
Parameters 
value—
Specifies the rate-limit value in Kbps. A rate of 0 results in all traffic being dropped. A rate of max results in all traffic being forwarded.
Values—
0 to 2000000000 Kbps, max

 

hop-limit—
Specifies the hop limit value for the rate limit action.
Values—
lt — Specifies “less than”. The lt parameter cannot be used with the lowest possible numerical value for the parameter.
gt — Specifies “greater than”. The gt parameter cannot be used with the highest possible numerical value for the parameter.
eq — Specifies “equal to”.

 

hop-limit-value
Specifies the hop limit value for the rate limit action.
Values—
0 to 255

 

range —
Specifies an inclusive range. When the range parameter is used, the start of the range (the first value entered) must be smaller than the end of the range (the second value entered).
expression—
Specifies the hexadecimal pattern to match; up to eight bytes.
Values—
0x0000000000000001 to 0xffffffffffffffff

 

mask —
Specifies the mask for the pattern expression, up to eight bytes.
Values—
0x0000000000000001 to 0xffffffffffffffff

 

offset-type —
Specifies the starting point reference for the offset-value of this pattern.
Values—
layer-3, layer-4, data, dns-qtype

 

offset-value —
Specifies the offset value for the pattern expression. Dns-qtype supports offset value of 0.
Values—
0 to 255

 

payload-length—
Specifies rate-limit packets matching both the filter entry match criteria and the payload-length-value defined in the rate-limit action statement. Packets matching the filter entry match criteria and not matching the payload-length-value, as defined in the rate-limit action statement, are implicitly forwarded with no further match in the following filter entries.
Values—
lt — Specifies “less than”. The lt parameter cannot be used with the lowest possible numerical value for the parameter.
gt — Specifies “greater than”. The gt parameter cannot be used with the highest possible numerical value for the parameter.
eq — Specifies “equal to”.

 

payload-length-value—
Specifies the payload length value for the rate limit action.
Values—
0 to 65535

 

match

Syntax 
match [{next-header protocol-id | next-header-list protocol-list-name}]
match next-header none
no match
Context 
config>filter>ipv6-filter>entry
Description 

This command enables the context to enter match criteria for the filter entry. When the match criteria have been satisfied, the action associated with the match criteria is executed.

A match context may consist of multiple match criteria, but multiple match statements cannot be created per entry. More precisely, the next-header command can be entered multiple times, but this only results in modifying the protocol-id. Matching on more than one protocol can be achieved using the next-header-list match criteria.

The no form of the command removes all the match criteria from the filter entry and sets the protocol-id of the match command to none. However, match next-header none is not equivalent to no match.

Default 

match next-header none

Parameters 
next-header—
Specifies the IPv6 next header to match. This parameter is analogous to the protocol parameter used in IPv4 filter match command.

Default Value: none (keyword)

Values—
[1 to 42 | 45 to 49 | 52 to 59 | 61 to 255] — in decimal format. Values can also be specified in hexadecimal format, in binary format, or using the following keywords:
none, icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp
* — udp/tcp wildcard

 

protocol-list-name
Specifies the name of the protocol list, up to 32 characters.

ah-ext-hdr

Syntax 
ah-ext-hdr {true | false}
no ah-ext-hdr
Context 
config>filter>ipv6-filter>entry>match
Description 

This command enables match on existence of AH Extension Header in the IPv6 filter policy.

The no form of this command ignores AH Extension Header presence/absence in a packet when evaluating match criteria of a given filter policy entry.

Default 

no ah-ext-hdr

Parameters 
true
Matches a packet with an AH Extension Header.
false —
Matches a packet without an AH Extension Header.

esp-ext-hdr

Syntax 
esp-ext-hdr {true | false}
no esp-ext-hdr
Context 
config>filter>ipv6-filter>entry>match
Description 

This command enables match on existence of ESP Extension Header in the IPv6 filter policy.

The no form of this command ignores ESP Extension Header presence/absence in a packet when evaluating match criteria of a given filter policy entry.

Default 

no esp-ext-hdr

Parameters 
true
Matches a packet with an ESP Extension Header.
false —
Matches a packet without an ESP Extension Header.

flow-label

Syntax 
flow-label flow-label [mask]
no flow-label
Context 
config>filter>ipv6-filter>entry>match
Description 

This command configures the flow-label and optional mask match condition.

The no form of the command reverts to the default.

Default 

no flow-label

Parameters 
flow-label—
Specifies the flow label to be used as a match criterion. Value can be expressed as a decimal integer, as well as in hexadecimal or binary format. The following value shows decimal integer format only.
Values—
0 to 1048575

 

mask—
Specifies the flow label mask value for this policy IPv6 Filter entry. Value can be expressed as a decimal integer, as well as in hexadecimal or binary format. The following value shows decimal integer format only.
Values—
0 to 1048575

 

hop-by-hop-opt

Syntax 
hop-by-hop-opt {true | false}
no hop-by-hop-opt
Context 
config>filter>ipv6-filter>entry>match
Description 

This command enables match on existence of Hop-by-Hop Options Extension Header in the IPv6 filter policy.

The no form of this command ignores Hop-by-Hop Options Extension Header presence/absence in a packet when evaluating match criteria of a given filter policy entry.

Default 

no hop-by-hop-opt

Parameters 
true—
Matches a packet with a Hop-by-Hop Options Extension header.
false—
Matches a packet without a Hop-by-Hop Options Extension header.

packet-length

Syntax 
packet-length {lt | gt | eq} packet-length-value
packet-length range packet-length-value packet-length-value
no packet-length
Context 
config>filter>ipv6-filter>entry>match
Description 

This command configures the IPv6 packet length value match criterion. The IPv6 packet length represents the total packet length including the IPv6 header and the payload.

Default 

no packet-length

Parameters 
lt—
Specifies “less than”. The lt parameter cannot be used with the lowest possible numerical value for the parameter.
gt—
Specifies “greater than”. The gt parameter cannot be used with the highest possible numerical value for the parameter.
eq—
Specifies “equal to”.
packet-length-value—
Specifies the packet length value.
Values—
40 to 65575

 

range—
Specifies an inclusive range. When range is used, the beginning of the range must have a value less than the second value of the range.

routing-type0

Syntax 
routing-type0 {true | false}
no routing-type0
Context 
config>filter>ipv6-filter>entry>match
Description 

This command enables match on existence of Routing Type Extension Header type 0 in the IPv6 filter policy.

The no form of this command ignores Routing Type Extension Header type 0 presence/absence in a packet when evaluating match criteria of a given filter policy entry.

Default 

no routing-type0

Parameters 
true —
Specifies whether a packet contains Routing Type Extension Header type 0.
false —
Specifies whether a packet does not contain Routing Type Extension Header type 0.

4.4.2.4. MAC Filter Commands

mac-filter

Syntax 
mac-filter filter-id [create] [name name]
mac-filter {filter-id | filter-name}
no mac-filter {filter-id | filter-name}
Context 
config>filter
Description 

This command, creates a configuration context for the specified MAC filter policy.

The no form of the command deletes the MAC filter policy. A filter policy cannot be deleted until it is removed from all objects where it is applied.

Parameters 
filter-id—
Specifies the MAC filter policy ID expressed as a decimal integer.
Values—
1 to 65535

 

create—
This keyword is required to create the configuration context. After it is created, the context can be enabled with or without the create keyword.
name—
Configures an optional filter name, up to 64 characters in length, to a given filter. This filter name can then be used in configuration references, display, and show commands throughout the system. A defined filter name can help the service provider or administrator to identify and manage filters within the SR OS platforms.

To create a filter, you must assign a filter ID, however, after it is created, either the filter ID or filter name can be used to identify and reference a filter.

If a name is not specified at creation time, then SR OS assigns a string version of the filter-id as the name.

Filter names may not begin with an integer (0 to 9).

Values—
name: 64 characters maximum

 

filter-name—
A string of up to 64 characters uniquely identifying this MAC filter policy

drop

Syntax 
drop
Context 
config>filter>mac-filter>entry>action
Description 

This command sets the MAC filter entry action to drop.

forward

Syntax 
forward
forward esi esi service-id vpls-service-id
forward sap sap-id
forward sdp sdp-id:vc-id
Context 
config>filter>mac-filter>entry>action
Description 

This command sets the context for specific forward commands to be performed.

Parameters 
esi—
Specifies a 10-byte Ethernet Segment Identifier.
service-id—
Specifies that a packet matching the entry is forwarded to an ESI-identified first appliance in the Nuage service chain using an EVPN-resolved VXLAN tunnel in the specified VPLS service.
vpls-service-id—
Specifies an existing VPLS service ID or service name.
sap—
Specifies that the packet matching the entry is forwarded using the configured SAP.
sap-id—
Specifies an existing VPLS Ethernet SAP.
sdp—
Specifies that the packet matching the entry is forwarded using the configured SDP.
sdp-id:vc-id —
Specifies an existing VPLS SDP.

http-redirect

Syntax 
http-redirect url
Context 
config>filter>mac-filter>entry>action
Description 

This command sets the MAC filter entry action to HTTP redirect.

Parameters 
url—
Specifies the URL, up to 255 characters.

rate-limit

Syntax 
rate-limit value
Context 
config>filter>mac-filter>entry>action
Description 

This command sets the rate limit for the traffic matching both the filter entry match criteria and the packet-length-value defined in the rate-limit action statement.

Packets matching the filter entry match criteria and not matching the packet-length-value defined in the rate-limit action statement are implicitly forwarded with no further match in subsequent filter entries.

Rate limit packets matching both the filter entry match criteria and the ttl-value are defined in the action rate-limit statement.

Packets matching the filter entry match criteria and not matching the ttl-value defined in the rate-limit action statement are implicitly forwarded with no further match in the following filter entries.

Parameters 
value—
Specifies the rate-limit value in kb/s. A rate of 0 results in all traffic being dropped. A rate of max results in all traffic being forwarded.
Values—
0 to 2000000000 kb/s | max

 

match

Syntax 
match [frame-type {802dot3 | 802dot2-llc | 802dot2-snap | ethernet_II}]
no match
Context 
config>filter>mac-filter>entry
Description 

This command creates the context for entering/editing match criteria for the filter entry and specifies an Ethernet frame type for the entry.

A match context may consist of multiple match criteria, but multiple match statements cannot be entered per entry.

The no form of the command removes the match criteria for the entry-id.

Parameters 
frame-type—
The frame-type keyword configures an Ethernet frame type to be used for the MAC filter match criteria.
Default—
802dot3
Values—
802dot3, 802dot2-llc, 802dot2-snap, ethernet_II

 

802dot3—
Specifies the frame type is Ethernet IEEE 802.3.
802dot2-llc—
Specifies the frame type is Ethernet IEEE 802.2 LLC.
802dot2-snap—
Specifies the frame type is Ethernet IEEE 802.2 SNAP.
ethernet_II—
Specifies the frame type is Ethernet Type II.

dot1p

Syntax 
dot1p dot1p-value [dot1p-mask]
no dot1p
Context 
config>filter>mac-filter>entry>match
Description 

Configures an IEEE 802.1p value or range to be used as a MAC filter match criterion.

When a frame is missing the 802.1p bits, specifying an dot1p match criterion will fail for the frame and result in a non-match for the MAC filter entry.

The no form of the command removes the criterion from the match entry.

Egress dot1p value matching will only match if the customer payload contains the 802.1p bits. For example, if a packet ingresses on a null encapsulated SAP and the customer packet is IEEE 802.1Q or 802.1p tagged, the 802.1p bits will be present for a match evaluation. On the other hand, if a customer tagged frame is received on a dot1p encapsulated SAP, the tag will be stripped on ingress and there will be no 802.1p bits for a MAC filter match evaluation; in this case, any filter entry with a dot1p match criterion specified will fail.

Default 

no dot1p

Parameters 
dot1p-value—
Specifies the IEEE 802.1p value in decimal.
Values—
0 to 7

 

dot1p-mask—
Specifies a 3-bit mask that can be configured using the decimal integer, hexadecimal or binary format.
Table 58:  dot1p-mask Formats 

Format Style

Format Syntax

Example

Decimal

D

4

Hexadecimal

0xH

0x4

Binary

0bBBB

0b100

To select a range from 4 up to 7 specify dot1p-value of 4 and a dot1p-mask of 0b100 for value and mask.

Default—
7 (decimal)
Values—
1 to 7 (decimal)

 

dsap

Syntax 
dsap dsap-value [dsap-mask]
no dsap
Context 
config>filter>mac-filter>entry>match
Description 

Configures an Ethernet 802.2 LLC DSAP value or range for a MAC filter match criterion.

This is a one-byte field that is part of the 802.2 LLC header of the IEEE 802.3 Ethernet Frame.

The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria.

Use the no form of the command to remove the dsap value as the match criterion.

Default 

no dsap

Parameters 
dsap-value—
Specifies the 8-bit dsap match criteria value which can be expressed in decimal integer, hexadecimal or binary format.
Values—
0 to 255

 

dsap-mask—
Specifies an optional parameter that may be used when specifying a range of dsap values to use as the match criteria.

This 8 bit mask can be configured using the decimal integer, hexadecimal or binary formats described in Table 59.

Table 59:  dsap-mask Formats 

Format Style

Format Syntax

Example

Decimal

DDD

240

Hexadecimal

0xHH

0xF0

Binary

0bBBBBBBBB

0b11110000

Default—
255 (exact match)
0x00 to 0xFF
Values—
0 to 255

 

dst-mac

Syntax 
dst-mac ieee-address [ieee-address-mask]
no dst-mac
Context 
config>filter>mac-filter>entry>match
Description 

Configures a destination MAC address or range to be used as a MAC filter match criterion.

The no form of the command removes the destination mac address as the match criterion.

Default 

no dst-mac

Parameters 
ieee-address—
Specifies the MAC address to be used as a match criterion.
Values—
HH:HH:HH:HH:HH:HH or HH-HH-HH-HH-HH-HH where H is a hexadecimal digit. Note that both upper and lower case are supported.

 

ieee-address-mask—
Specifies a 48-bit mask to match a range of MAC address values.

To configure so that all packets with a destination MAC OUI value of 00:03:FA are subject to a match condition then the entry should be specified as: 00:03:FA:00:00:00 FF:FF:FF:00:00:00.

Default—
ff:ff:ff:ff:ff:ff (exact match)
Values—
HH:HH:HH:HH:HH:HH or HH-HH-HH-HH-HH-HH
where H is a hexadecimal digit. to 0xFFFFFFFFFFFF
Note that both upper and lower case are supported.

 

etype

Syntax 
etype 0x0600..0xffff
no etype
Context 
config>filter>mac-filter>entry>match
Description 

Configures an Ethernet type II Ethertype value to be used as a MAC filter match criterion.

The Ethernet type field is a two-byte field used to identify the protocol carried by the Ethernet frame. For example, 0800 is used to identify the IPv4 packets.

The Ethernet type field is used by the Ethernet version-II frames. IEEE 802.3 Ethernet frames do not use the type field. For IEEE 802.3 frames, use the dsap, ssap or snap-pid fields as match criteria.

The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria.

The no form of the command removes the previously entered etype field as the match criteria.

Default 

no etype

Parameters 
0x0600..0xffff—
Specifies the Ethernet type II frame Ethertype value to be used as a match criterion expressed in decimal integer or hexadecimal format.
Values—
1536 to 65535 or 0x0600 to 0xFFFF

 

inner-tag

Syntax 
inner-tag value [vid-mask]
no inner-tag
Context 
config>filter>mac-filter>entry>match
Description 

This command configures the matching of the second tag that is carried transparently through the service. The inner-tag on ingress is the second tag on the frame if there are no service delimiting tags. Inner tag is the second tag before any service delimiting tags on egress but is dependent in the ingress configuration and may be set to 0 even in cases where additional tags are on the frame. This allows matching VLAN tags for explicit filtering or QoS setting when using default or null encapsulations.

The inner-tag is not applicable in ingress on dot1Q SAPs. The inner-tag may be populated on egress depending on the ingress SAP type.

On QinQ SAPs of null and default that do not strip tags inner-tag will contain the second tag (which is still the second tag carried transparently through the service.) On ingress SAPs that strip any tags, inner-tag will contain 0 even if there are more than 2 tags on the frame.

The optional vid-mask is defaulted to 4095 (exact match) but may be specified to allow pattern matching. The masking operation is ((value and vid-mask) = = (tag and vid-mask)). A value of 6 and a mask of 7 would match all VIDs with the lower 3 bits set to 6.

For QoS the VID type cannot be specified on the default QoS policy.

The default vid-mask is set to 4095 for exact match.

Default 

no inner-tag

isid

Syntax 
isid value [to higher-value]
no isid
Context 
config>filter>mac-filter>entry>match
Description 

This command configures an ISID value or a range of ISID values to be matched by the mac-filter parent. The pbb-etype value for the related SAP (inherited from the ethernet port configuration) or for the related SDP binding (inherited from SDP configuration) will be used to identify the ISID tag.

The no form of this command removes the ISID match criterion.

Default 

no isid

Parameters 
value—
Specifies the ISID value, 24 bits as a decimal integer. When just one present identifies a specific ISID to be used for matching.
Values—
0 to 16777215

 

to higher-value—
Identifies a range of ISIDs to be used as matching criteria.

outer-tag

Syntax 
outer-tag value [vid-mask]
no outer-tag
Context 
config>filter>mac-filter>entry>match
Description 

This command configures the matching of the first tag that is carried transparently through the service. Service delimiting tags are stripped from the frame and outer tag on ingress is the first tag after any service delimiting tags. Outer tag is the first tag before any service delimiting tags on egress. This allows matching VLAN tags for explicit filtering or QoS setting when using default or null encapsulations.

On dot1Q SAPs outer-tag is the only tag that can be matched. On dot1Q SAPs with exact match (sap 2/1/1:50) the outer-tag will be populated with the next tag that is carried transparently through the service or 0 if there is no additional VLAN tags on the frame.

On QinQ SAPs that strip a single service delimiting tag, outer-tag will contain the next tag (which is still the first tag carried transparently through the service.) On SAPs with two service delimiting tags (two tags stripped) outer-tag will contain 0 even if there are more than 2 tags on the frame.

The optional vid-mask is defaulted to 4095 (exact match) but may be specified to allow pattern matching. The masking operation is ((value & vid-mask) = = (tag & vid-mask)). A value of 6 and a mask of 7 would match all VIDs with the lower 3 bits set to 6.

For QoS the VID type cannot be specified on the default QoS policy.

The default vid-mask is set to 4095 for exact match.

Default 

no outer-tag

snap-oui

Syntax 
snap-oui {zero | non-zero}
no snap-oui
Context 
config>filter>mac-filter>entry>match
Description 

This command configures an IEEE 802.3 LLC SNAP Ethernet Frame OUI zero or non-zero value to be used as a MAC filter match criterion.

The no form of the command removes the criterion from the match criteria.

Default 

no snap-oui

Parameters 
zero—
Specifies to match packets with the three-byte OUI field in the SNAP-ID set to zero.
non-zero—
Specifies to match packets with the three-byte OUI field in the SNAP-ID not set to zero.

snap-pid

Syntax 
snap-pid snap-pid
no snap-pid
Context 
config>filter>mac-filter>entry>match
Description 

Configures an IEEE 802.3 LLC SNAP Ethernet Frame PID value to be used as a MAC filter match criterion.

This is a two-byte protocol id that is part of the IEEE 802.3 LLC SNAP Ethernet Frame that follows the three-byte OUI field.

The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria.

The snap-pid match criterion is independent of the OUI field within the SNAP header. Two packets with different three-byte OUI fields but the same PID field will both match the same filter entry based on a snap-pid match criteria.

The no form of the command removes the snap-pid value as the match criteria.

Default 

no snap-pid

Parameters 
snap-pid—
Specifies the two-byte snap-pid value to be used as a match criterion. The value can be expressed in decimal integer or hexadecimal format.
Values—
0 to 65535 or 0x0000 to 0xFFFF

 

src-mac

Syntax 
src-mac ieee-address [ieee-address-mask]
no src-mac
Context 
config>filter>ip-filter>entry>match
config>filter>ipv6-filter>entry>match
config>filter>mac-filter>entry>match
Description 

Configures a source MAC address or range to be used as a MAC filter match criterion.

The no form of the command removes the source mac as the match criteria.

Default 

no src-mac

Parameters 
ieee-address—
Specifies the 48-bit IEEE MAC address to be used as a match criterion.
Values—
HH:HH:HH:HH:HH:HH or HH-HH-HH-HH-HH-HH where H is a hexadecimal digit; both upper and lower case are supported.

 

ieee-address-mask—
Specifies the 48-bit mask to match a range of MAC address values.

To configure so that all packets with a source MAC OUI value of 00:03:FA are subject to a match condition then the entry should be specified as: 00:03:FA:00:00:00 FF:FF:FF:00:00:00

Default—
ff:ff:ff:ff:ff:ff (exact match)
Values—
HH:HH:HH:HH:HH:HH or HH-HH-HH-HH-HH-HH where H is an hexadecimal digit; both upper and lower case are supported.

 

ssap

Syntax 
ssap ssap-value [ssap-mask]
no ssap
Context 
config>filter>mac-filter>entry>match
Description 

This command configures an Ethernet 802.2 LLC SSAP value or range for a MAC filter match criterion.

This is a one-byte field that is part of the 802.2 LLC header of the IEEE 802.3 Ethernet Frame.

The snap-pid field, etype field, ssap and dsap fields are mutually exclusive and may not be part of the same match criteria.

The no form of the command removes the ssap match criterion.

Default 

no ssap

Parameters 
ssap-value—
Specifies the 8-bit ssap match criteria value in decimal, hexadecimal or binary.
Values—
0 to 255

 

ssap-mask—
Specifies an optional parameter that may be used when specifying a range of ssap values to use as the match criteria.

This 8 bit mask and the ssap value can be configured as described in Table 60.

Table 60:  8-bit Mask Syntax 

Format Style

Format Syntax

Example

Decimal

DDD

240

Hexadecimal

0xHH

0xF0

Binary

0bBBBBBBBB

0b11110000

Values—
0 to 255

 

type

Syntax 
type filter-type
Context 
config>filter>mac-filter
Description 

This command configures the MAC Filter Policy type as being either normal, ISID or VID.

Default 

type normal

Parameters 
filter-type—
Specifies which type of entry this MAC filter can contain.
Values—
normal — regular match criteria are allowed; ISID or VID filter match criteria not allowed isid — only ISID match criteria are allowed vid — only VID match criteria are allowed on ethernet_II frame types

 

4.4.2.5. GRE Tunnel Template Configuration Commands

gre-tunnel-template

Syntax 
gre-tunnel-template name [create]
no gre-tunnel-template name
Context 
config>filter
Description 

This command enables the context to configure a GRE tunnel template parameters to be used to tunnel associated traffic.

The no form of this command removes the GRE tunnel template from the configuration.

Parameters 
name—
Specifies a GRE tunnel template name up to 32 characters.
create—
This keyword is required to create the configuration context. Once it is created, the context can be enabled with or without the create keyword.

ipv4

Syntax 
ipv4
Context 
config>filter>gre-tun-tmp
Description 

This command enables the context to configure GRE tunnel template IPv4 parameters.

destination-address

Syntax 
[no] destination-address ip-address
Context 
config>filter>gre-tun-tmp>ipv4
Description 

This command defines one or more destinations for the GRE IP header used to encapsulate the matching IPv4/IPv6 packet.

Traffic matching the associated IPv4 or IPv6 filter are hashed across all available destination address. If no destination address is available, then matching traffic follows the configured pbr-down-action-override action, if configured.

The no form of this command removes the specified destination IP address configuration from the associated GRE tunnel template.

Parameters 
ip-address—
Specifies up to 16 IPv4 addresses to be used as the destination address.

gre-key

Syntax 
gre-key if-index
no gre-key
Context 
config>filter>gre-tun-tmp>ipv4
Description 

This command enables the population of the GRE key field in the GRE header sent with the encapsulated IP packet.

The no form of this command disables the population of the optional GRE key field when the matching IP packet is sent encapsulated in a GRE tunnel.

Parameters 
if-index—
Causes the GRE key field to be populated with the ifIndex of the ingress interface on which the matching IP packet was received.

skip-ttl-decrement

Syntax 
[no] skip-ttl-decrement
Context 
config>filter>gre-tun-tmp>ipv4
Description 

This command enables an option to not decrement the TTL of the IP packet matching the IPv4/IPv6 filter, when it is encapsulated into the GRE tunnel header.

The no form of this command disables this option (default). This results in the matching of IP packet’s TTL field to be decremented before it is encapsulated in the GRE tunnel header.

source-address

Syntax 
source-address ip-address
no source-address
Context 
config>filter>gre-tun-tmp>ipv4
Description 

This command defines the source IPv4 address to be used in the GRE IP header used to encapsulate the matching IPv4/IPv6 packet. This IP address can be configured as any value and is not validated against a local IP address. The source-address command must be configured for the template to be valid.

The no form of this command removes the source IP address configuration from the associated GRE tunnel template.

Parameters 
ip-address—
Specifies the IPv4 address (in dotted decimal notation) to be used as the source address.

4.4.2.6. System Filter Policy Commands

system-filter

Syntax 
system-filter
Context 
config>filter
Description 

This command enables the context to activate system filter policies.

ip

Syntax 
[no] ip ip-filter-id
Context 
config>filter>system-filter
Description 

This command activates an IPv4 system filter policy. Once activated, all IPv4 ACL filter policies that chain to the system filter (config>filter>ip-filter>chain-to-system-filter) will automatically execute system filter policy rules first.

The no form of the command deactivates the system filter policy.

Parameters 
ip-filter-id—
Specifies the existing IPv4 filter policy with scope system. This parameter can either be expressed as a decimal integer, or as an ASCII string of up to 64 characters.
Values—
1 to 65535 or the filter policy name (filter-name, 64 char max)

 

ipv6

Syntax 
[no] ipv6 ipv6-filter-id
Context 
config>filter>system-filter
Description 

This command activates an IPv6 system filter policy. Once activated, all IPv6 ACL filter policies that chain to the system filter (config>filter>ipv6-filter>chain-to-system-filter) will automatically execute system filter policy rules first.

The no form of the command deactivates the system filter policy.

Parameters 
ipv6-filter-id—
Specifies the existing IPv6 filter policy with scope system. This parameter can either be expressed as a decimal integer, or as an ASCII string of up to 64 characters in length.
Values—
1 to 65535 or the filter policy name

 

filter-name

Syntax 
filter-name filter-name
no filter-name
Context 
config>filter>ip-exception
Description 

This command configures filter-name attribute of a given filter. filter-name, when configured, can be used instead of filter ID to reference the given policy in the CLI.

Default 

no filter-name

Parameters 
filter-name—
Specifies a string up to 64 characters in length that uniquely identifies this filter policy.

The following restrictions apply to the filter-name:

  1. Policy names may not begin with a number (0-9).
  2. Policy names may not begin with the underscore “_” character (e.g. _myPolicy). Names that start with underscore are reserved for system generated names.
  3. “fSpec-x” (where x is any number) cannot be used as a user defined filter name.

4.4.2.7. Redirect Policy Configuration Commands

redirect-policy

Syntax 
redirect-policy redirect-policy-name [create]
no redirect-policy redirect-policy-name
Context 
config>filter
Description 

This command, creates a configuration context for the specified redirect policy.

The no form of the command removes the redirect policy from the filter configuration only if the policy is not referenced in a filter and the filter is not in use (applied to a service or network interface).

Parameters 
redirect-policy-name—
Specifies the redirect policy name. Allowed values are any string up to 32 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotes. There is no limit to the number of redirect policies that can be configured.
create—
This keyword is required to create the configuration context. Once it is created, the context can be enabled with or without the create keyword.

destination

Syntax 
destination ip-address [create]
no destination ip-address
Context 
config>filter>redirect-policy
Description 

This command defines a destination in a redirect policy. More than one destination can be configured. Whether a destination IPv4/IPv6 address will receive redirected packets depends on the effective priority value after evaluation.

The most preferred destination is programmed in hardware as action forward next-hop. If all destinations are down (as determined by the supported tests), action forward is programmed in hardware. All destinations within a given policy must be either IPv4 or (exclusive) IPv6. The redirect policy with IPv4 destinations configured can only be used by IPv4 filter policies. The redirect policy with IPv6 destinations configured can only be used by IPv6 filter policies.

Default 

no destination

Parameters 
ip-address—
Specifies the IPv4 address (in dotted decimal notation) or IPv6 address to send the redirected traffic to.
Values—
IPv4 address:         ip-address: a.b.c.d
IPv6-address:         x:x:x:x:x:x:x:x (eight 16-bit pieces)
                               x:x:x:x:x:x:d.d.d.d
                               x: [0..FFFF]H
                               d: [0..255]D

 

ping-test

Syntax 
[no] ping-test
Context 
config>filter>redirect-policy>dest
Description 

This command configures parameters to perform connectivity ping tests to validate the ability for the destination to receive redirected traffic.

Default 

no ping-test

drop-count

Syntax 
drop-count consecutive-failures [hold-down seconds]
no drop-count
Context 
config>filter>redirect-policy>dest>ping-test
Description 

This command specifies the number of consecutive requests that must fail for the destination to be declared unreachable and the time to hold destination unreachable before repeating tests.

Default 

drop-count 3 hold-down 0

Parameters 
consecutive-failures—
Specifies the number of consecutive ping test failures before declaring the destination down.
Values—
1 to 60

 

hold-down seconds
Specifies the amount of time, in seconds, that the system should be held down if any of the test has marked it unreachable.
Values—
0 to 86400

 

interval

Syntax 
interval [seconds]
no interval
Context 
config>filter>redirect-policy>dest>ping-test
Description 

This command specifies the amount of time, in seconds, between consecutive requests sent to the far end host.

Default 

interval 1

Parameters 
seconds—
Specifies the amount of time, in seconds, between consecutive requests sent to the far end host.
Values—
1 to 60

 

source-address

Syntax 
source-address [ip-address]
no source-address
Context 
config>filter>redirect-policy>dest>ping-test
Description 

This command configures the source address to use in the IP packet of the ping test for this destination.

Default 

no source-address

Parameters 
ip-address—
The source address of the IP packet. This can be IPv4 only for an IPv4 destination and IPv6 only for an IPv6 destination.
Values—

ipv4-address:

a.b.c.d.

ipv6-address:

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x: [0 to FFFF]H

d: [0 to 255]D

 

timeout

Syntax 
timeout [seconds]
no timeout
Context 
config>filter>redirect-policy>dest>ping-test
Description 

Specifies the amount of time, in seconds, that is allowed for receiving a response from the far-end host. If a reply is not received within this time the far-end host is considered unresponsive.

Default 

timeout 1

Parameters 
seconds—
Specifies the amount of time, in seconds, that is allowed for receiving a response from the far end host.
Values—
1 to 60

 

priority

Syntax 
priority [priority]
no priority
Context 
config>filter>redirect-policy>dest
Description 

Redirect policies can contain multiple destinations. Each destination is assigned an initial or base priority which describes its relative importance within the policy.

Default 

priority 100

Parameters 
priority—
Specifies the priority, expressed as a decimal integer, used to weigh the destination’s relative importance within the policy.
Values—
1 to 255

 

shutdown

Syntax 
[no] shutdown
Context 
config>filter>redirect-policy
config>filter>redirect-policy>destination
config>filter>log>summary
Description 

Administratively enables/disabled (AdminUp/AdminDown) an entity. Downing an entity does not change, reset or remove any configuration settings or statistics. Many objects must be shutdown before they may be deleted.

The shutdown command administratively downs an entity. Administratively downing an entity changes the operational state of the entity to down.

Unlike other commands and parameters where the default state will not be indicated in the configuration file, shutdown and no shutdown are always indicated in system generated configuration files.

The no form of the command puts an entity into the administratively enabled state.

Default 

no shutdown

unicast-rt-test

Syntax 
[no] unicast-rt-test
Context 
config>filter>redirect-policy>dest
Description 

This command configures a unicast route test for this destination. A destination is eligible for redirect if a valid unicast route to that destination exists in the routing instance specified by config>filter>redirect-policy>router. The unicast route test is mutually exclusive with other redirect-policy test types.

The test cannot be configured if no router is configured for this redirect policy.

The no form of the command disables the test.

Default 

no unicast-rt-test

notify-dest-change

Syntax 
[no] notify-dest-change
Context 
config>filter>redirect-policy
Description 

This command instructs the system to send notifications (Log, SNMP, …) when the active destination of a redirect policy changes. No notification is sent when there are no more active destinations (as this is covered by a specific other notification). Notifications can be controlled (using the config>log>event-control command) using application ID 2017 and event-name tFilterRPActiveDstChangeEvent.

The no form of the command disables notification generation.

Default 

no notify-dest-change

router

Syntax 
router router-instance
router service-name service-name
no router
Context 
config>filter>redirect-policy
Description 

This command enhances VRF support in redirect policies. When a router instance is specified, the configured destination tests are run in the specified router instance, and the PBR action is executed in the specified router instance. If no destination is active or if the hardware does not support PBR action “next-hop router”, action forward will be executed (i.e. routing will be performed in the context of the incoming interface routing instance).

The no form of the command preserves backward-compatibility. Tests always run in the “Base” routing instance context, and the PBR action executes in the routing context of the ingress interface that the filter using this redirect policy is deployed on.

Default 

no router

Parameters 
router-instance—
Specifies a router instance in the form of router-name or service-id.
Values—
router-name — Base
service-id — Specifies an existing Layer 3 service [1 to 2147483647]

 

service-name
Specifies the name of a configured Layer 3 service.

redirect-policy-binding

Syntax 
redirect-policy-binding name [create]
no redirect-policy-binding name
Context 
config>filter
Description 

This command creates a redirect-policy binding (specified by its name) in case it does not exist and, enters the context associated with it. When a redirect-policy binding is created, no destination is associated to this binding by default and the binding operator is set to AND.

The no form of this command deletes the redirect-policy binding and all the associated configuration information.

Parameters 
name—
Specifies the name of the binding. Possible values are any string up to 32 characters long composed of printable, 7-bit ASCII characters. If the string contains special characters (#, $, spaces, etc.), the entire string must be enclosed within double quotations.
create—
This keyword is required to create the binding if it does not exist. This has no effect when used with an existing binding.

binding-operator

Syntax 
binding-operator {and | or}
no binding-operator
Context 
config>filter>redirect-policy-binding
Description 

This command configures the logical operator to use with the destinations test results to obtain the master test result (the redirect-policy binding test result). A change in this configuration results in the re-evaluation of the master test result.

The no version of this command sets the value to its default

Default 

binding-operator and

Parameters 
and | or—
Keyword to specify the type of logical or boolean operation to perform between the individual destinations test results to obtain the master result.

redirect-policy

Syntax 
redirect-policy redirect-policy-name destination ip-address
no redirect-policy redirect-policy-name [destination ip-address]
Context 
config>filter>redirect-policy-binding
Description 

This command adds the destination (specified by its IP address) of a redirect-policy (specified by its name) to the binding. An error is thrown if either the destination does not exist for the specified redirect-policy or if the redirect-policy does not exist.

The no form of the command removes from the binding from all the destinations of the specified redirect-policy, or only the specified destination.

Parameters 
redirect-policy-name—
Specifies the name of the redirect-policy (up to 32 characters) as the destination that is to be added to the binding.
ip-address—
The IP address of the destination. This can be an IPv4 or IPv6 address.
Values—

ipv4-address:

a.b.c.d.

ipv6-address:

x:x:x:x:x:x:x:x (eight 16-bit pieces)

x:x:x:x:x:x:d.d.d.d

x: [0 to FFFF]H

d: [0 to 255]D

 

4.4.2.8. Match Filter List Commands

match-list

Syntax 
match-list
Context 
config>filter
Description 

This command enables the configuration context for match lists to be used in filter policies (IOM/FP and CPM).

ip-prefix-list

Syntax 
ip-prefix-list ip-prefix-list-name [create]
no ip-prefix-list ip-prefix-list-name
Context 
config>filter>match-list
Description 

This command creates a list of IPv4 prefixes for match criteria in IPv4 ACL and CPM filter policies.

The no form of this command deletes the specified list.

Operational Notes:

An ip-prefix-list must contain only IPv4 address prefixes.

An IPv4 prefix match list cannot be deleted if it is referenced by a filter policy.

See general description related to match-list usage in filter policies.

Parameters 
ip-prefix-list-name—
Specifies a string of up to 32 printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.

apply-path

Syntax 
[no] apply-path
Context 
config>filter>match-list>ip-prefix-list
config>filter>match-list>ipv6-prefix-list
Description 

This command enables the context to configure auto-generation of address prefixes for IPv4 or IPv6 address prefix match lists. The context in which the command is executed governs whether IPv4 or IPv6 prefixes will be auto-generated.

The no form of this command removes all auto-generation configuration under the apply-path context.

Default 

no apply path

bgp-peers

Syntax 
bgp-peers criterion-index group reg-exp neighbor reg-exp
bgp-peers criterion-index router router-instance group reg-exp neighbor reg-exp
bgp-peers criterion-index router service-name service-name group reg-exp neighbor reg-exp
no bgp-peers criterion-index
Context 
config>filter>match-list>ip-prefix-list>apply-path
config>filter>match-list>ipv6-prefix-list>apply-path
Description 

This command configures auto-generation of IPv4 or IPv6 address prefixes (as required by the context that the command is executed within) based on the base router BGP instance configuration.

The no form of this command removes the bgp-peers configuration for auto-generation of address prefixes for the specified index value.

Parameters 
service-name—
Specifies the service name, up to 64 characters in length.
group
Configures a match against the base router BGP instance group configuration.

Regex match (.*) can be used to match against any group.

neighbor
Configures a match against the base router BGP instance neighbor configuration.

Regex match (.*) can be used to match against any neighbor.

criterion-index —
Specifies an integer from 1 to 255 enumerating BGP peers auto-generation configuration within this list.
router-instance—
Specifies the router name or service ID.
Values—
router-instance: router-name or vprn-svc-id
router-name: "Base"
vprn-svc-id: 1 to 2147483647
service-name: Specifies the service name, up to 64 characters in length.

 

router—
Configures a match against the base router BGP instance configuration.
reg-exp—
Specifies a regular expression that defines a match string, up to 255 characters in length, to be used to auto-generate address prefixes. Matching is performed from the least-significant digit. For example, a string 10.0 matches all neighbors with addresses starting with 10, such as 10.0.x.x or 10.0xx.x.x.

prefix

Syntax 
[no] prefix ip-prefix/prefix-length
Context 
config>filter>match-list>ip-prefix-list
Description 

This command adds an IPv4 address prefix to an existing IPv4 address prefix match list.

The no form of this command deletes the specified prefix from the list.

Operational Notes:

To add set of unique prefixes, execute the command with all unique prefixes. The prefixes are allowed to overlap IPv4 address space.

An IPv4 prefix addition will be blocked, if resource exhaustion is detected anywhere in the system because of filter policies that use this IPv4 address prefix list.

Parameters 
ip-prefix—
Specifies a valid IPv4 address prefix in dotted decimal notation.
Values—
0.0.0.0 to 255.255.255.255 (host bit must be 0)

 

prefix-length—
Specifies the length of the entered IPv4 prefix.
Values—
0 to 32

 

prefix-exclude

Syntax 
[no] prefix-exclude ip-prefix/prefix-length
Context 
config>filter>match-list>ip-pfx-list
Description 

This command excludes IPv4 prefix(es) from an ip-prefix-list. The prefix-exclude command is mutually exclusive with apply-path.

The no form of this command deletes the specified excluded prefixes from the ip-prefix-list.

Parameters 
ip-prefix—
Specifies a valid IPv4 address prefix in dotted decimal notation.
Values—
0.0.0.0 to 255.255.255.255 (host bit must be 0)

 

prefix-length—
Specifies the length of the entered IPv4 prefix.
Values—
0 to 32

 

ipv6-prefix-list

Syntax 
ipv6-prefix-list ipv6-prefix-list-name [create]
no ipv6-prefix-list ipv6-prefix-list-name
Context 
config>filter>match-list
Description 

This command creates a list of IPv6 prefixes for match criteria in ACL and CPM IPv6 filter policies.

The no form of this command deletes the specified list.

Operational Notes:

An ipv6-prefix-list must contain only IPv6 address prefixes.

An ipv6-prefix-list cannot be deleted if it is referenced by a filter policy.

See general description related to match-list usage in filter policies.

Parameters 
ipv6-prefix-list-name—
Specifies a string of up to 32 printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.

prefix

Syntax 
[no] prefix ipv6-prefix/prefix-length
Context 
config>filter>match-list>ipv6-prefix-list
Description 

This command adds an IPv6 address prefix to an existing IPv6 address prefix match list.

The no form of this command deletes the specified prefix from the list.

Operational Notes:

To add set of different prefixes, execute the command with all unique prefixes. The prefixes are allowed to overlap IPv6 address space.

An IPv6 prefix addition will be blocked, if resource exhaustion is detected anywhere in the system because of filter policies that use this IPv6 address prefix list.

Parameters 
ipv6-prefix/prefix-length—
Specifies an IPv6 address prefix written as hexadecimal numbers separated by colons with host bits set to 0. One string of zeros can be omitted, so 2001:db8::700:0:217A is equivalent to 2001:db8:0:0:0:700:0:217A.
Values—
x:x:x:x:x:x:x:x (eight 16-bit pieces)
x:x:x:x:x:x:d.d.d.d
x: [0..FFFF]H
d: [0..255]D

 

prefix-length—
Specifies the length of the entered IPv6 prefix.
Values—
1 to 128

 

prefix-exclude

Syntax 
[no] prefix ipv6-prefix/prefix-length
Context 
config>filter>match-list>ipv6-pfx-list
Description 

This command excludes IPv6 prefix(es) from an ipv6-prefix-list.The prefix-exclude command is mutually exclusive with apply-path.

The no form of this command deletes the specified excluded prefixes from the ipv6-prefix-list.

Parameters 
ipv6-prefix/prefix-length—
Specifies an IPv6 address prefix written as hexadecimal numbers separated by colons with host bits set to 0. One string of zeros can be omitted, so 2001:db8::700:0:217A is equivalent to 2001:db8:0:0:0:700:0:217A.
Values—
x:x:x:x:x:x:x:x (eight 16-bit pieces)
x:x:x:x:x:x:d.d.d.d
x: [0..FFFF]H
d: [0..255]D

 

prefix-length—
Specifies the length of the entered IPv6 prefix.
Values—
1 to 128

 

port-list

Syntax 
port-list port-list-name [create]
no port-list port-list-name
Context 
config>filter>match-list
Description 

This command creates a list of TCP/UDP/SCTP port values or ranges for match criteria in IPv4 and IPv6 ACL and CPM filter policies.

The no form of this command deletes the specified list.

Operational notes:

SCTP port match is supported in ACL filter policies only.

A port-list must contain only TCP/UDP/SCTP port values or ranges.

A TCP/UDP/SCTP port match list cannot be deleted if it is referenced by a filter policy.

See general description related to match-list usage in filter policies.

Parameters 
port-list-name—
Specifies a string of up to 32 characters of printable ASCII characters. If special characters are used, the string must be enclosed within double quotes.

port

Syntax 
[no] port port-number
[no] port range start end
Context 
config>filter>match-list>port-list
Description 

This command adds a port or a range of ports to an existing port match list. The no form of this command deletes the specified port or range of ports form the list.

Parameters 
port-number—
Specifies the port number to add to the list. The port number can be expressed as a decimal integer, as well as in hexadecimal or binary format. Below shows decimal integer only.
Values—
0 to 65535

 

start end—
Specifies an inclusive port range between two port numbers values. The start of the range and end of the range can be expressed as decimal integers, as well as in hexadecimal or binary format. The following value shows decimal integer only.
Values—
0 to 65535

 

protocol-list

Syntax 
protocol-list protocol-list-name [create]
no protocol-list protocol-list-name
Context 
config>filter>match-list
Description 

This command creates a list of IP protocols that can be used in line card IP and IPv6 filters.

The no form of this command removes the IP protocol list.

Default 

no protocol-list

Parameters 
protocol-list-name—
Specifies the name of the protocol list.
create—
This keyword is required to create the protocol list. After it is created, the protocol list can be enabled with or without the create keyword.

protocol

Syntax 
[no] protocol protocol-id
Context 
config>filter>match-list>protocol-list
Description 

This command adds a protocol to the protocol list.

The no form of this command removes the protocol from the protocol-list.

Default 

no protocol

Parameters 
protocol-id
protocol-number | protocol-name
protocol-number—
Specifies the protocol number value to be added or removed form the protocol list. The value can be expressed as a decimal integer, or in hexadecimal or binary format.
Values—
[0..255]D, [0x0..0xFF]H, [0b0..0b11111111]B

 

protocol-name—
Specifies the protocol name to be added or removed from the protocol list.
Values—
icmp, igmp, ip, tcp, egp, igp, udp, rdp, ipv6, ipv6-route, ipv6-frag, idrp, rsvp, gre, ipv6-icmp, ipv6-no-nxt, ipv6-opts, iso-ip, eigrp, ospf-igp, ether-ip, encap, pnni, pim, vrrp, l2tp, stp, ptp, isis, crtp, crudp, sctp.

 

4.4.2.9. Log Filter Commands

log

Syntax 
log log-id [create]
no log log-id
Context 
config>filter
Description 

This command, creates a configuration context for the specified filter log if it does not exist, and enables the context to configure the specified filter log.

The no form of the command deletes the filter log. The log cannot be deleted if there are filter entries configured to write to the log. All filter entry logging associations need to be removed before the log can be deleted.

Default 

log 101

Special Cases 
Filter log 101—
Filter log 101 is the default log and is automatically created by the system. Filter log 101 is always a memory filter log and cannot be changed to a Syslog filter log. The log size defaults to 1000 entries, the filter log description is set to "Default filter log". The number of entries and wrap-around behavior can be modified.
Parameters 
log-id—
Specifies the filter log ID expressed as a decimal integer.
Values—
101 to 199

 

create—
This keyword is required to create the configuration context. After it is created, the context can be enabled with or without the create keyword.

destination

Syntax 
destination memory num-entries
destination syslog syslog-id
no destination
Context 
config>filter>log
Description 

This command configures the destination for filter log entries for the filter log ID.

Filter logs can be sent to either memory (memory) or to an existing Syslog server definition (syslog).

If the filter log destination is memory, the maximum number of entries in the log must be specified.

The no form of the command deletes the filter log association.

Default 

destination memory 1000

Parameters 
memory num-entries
Specifies the destination of the filter log ID is a memory log. The num-entries value is the maximum number of entries in the filter log expressed as a decimal integer.
Values—
10 to 50000

 

syslog syslog-id
Specifies the destination of the filter log ID is a Syslog server. The syslog-id parameter is the number of the Syslog server definition.
Values—
1 to 10

 

summary

Syntax 
summary
Context 
config>filter>log
Description 

This command enables the context to configure log summarization. These settings will only be taken into account when syslog is the log destination.

summary-crit

Syntax 
summary-crit dst-addr
summary-crit src-addr
no summary-crit
Context 
config>filter>log>summary
Description 

This command defines the key of the index of the mini-table. If key information is changed while summary is administratively enabled (no shutdown), the filter summary mini-table is flushed and recreated with different key information. Log packets received during the reconfiguration time will be handled as if summary was not active.

The no form of the command reverts to the default parameter.

Default 

summary-crit src-addr

Parameters 
dst-addr—
Specifies that received log packets are summarized based on the destination IPv4, IPv6, or MAC address.
src-addr—
Specifies that received log packets are summarized based on the source IPv4, IPv6 or MAC address.

wrap-around

Syntax 
[no] wrap-around
Context 
config>filter>log
Description 

This command configures a memory filter log to log until full or to store the most recent log entries (circular buffer).

Specifying wrap-around configures the memory filter log to store the most recent filter log entries (circular buffer). When the log is full, the oldest filter log entries are overwritten with new entries.

The no form of the command configures the memory filter log to accept filter log entries until full. When the memory filter log is full, filter logging for the log filter ID ceases.

Default 

wrap-around

4.4.2.10. Copy Filter Commands

copy

Syntax 
copy
Context 
config>filter
Description 

This command copies existing filter list entries for a specific filter ID to another filter ID. The copy command is a configuration level maintenance tool used to create new filters using existing filters. It also allows bulk modifications to an existing policy with the use of the overwrite keyword. If overwrite is not specified, an error will occur if the destination policy ID exists.

ip-filter

Syntax 
ip-filter src-filter-id [src-entry src-entry-id] to dst-filter-id [dst-entry dst-entry-id] [overwrite]
Context 
config>filter
Description 

This command copies existing filter list entries for a specific filter ID to another filter ID. The copy command is a configuration level maintenance tool used to create new filters using existing filters. It also allows bulk modifications to an existing policy with the use of the overwrite keyword. If overwrite is not specified, an error will occur if the destination policy ID exists.

Parameters 
ip-filter—
Indicates that the src-filter-id and the dst-filter-id are IPv4 filter IDs.
src-filter-id—
Identifies the source filter policy from which the copy command will attempt to copy. The filter policy must exist within the context of the preceding keyword (ip-filter, ipv6-filter or mac-filter).
dst-filter-id—
Identifies the destination filter policy to which the copy command will attempt to copy. If the overwrite keyword does not follow, the filter policy ID cannot already exist within the system for the filter type the copy command is issued for. If the overwrite keyword is present, the destination policy ID may or may not exist.
overwrite—
Specifies that the destination filter ID may exist. If it does, everything in the existing destination filter ID will be completely overwritten with the contents of the source filter ID. If the destination filter ID exists, either overwrite must be specified or an error message will be returned. If overwrite is specified, the function of copying from source to destination occurs in a “break before make” manner and therefore should be handled with care.

ipv6-filter

Syntax 
ipv6-filter src-filter-id [src-entry src-entry-id] to dst-filter-id [dst-entry dst-entry-id] [overwrite]
Context 
config>filter
Description 

This command copies existing filter list entries for a specific filter ID to another filter ID. The copy command is a configuration level maintenance tool used to create new filters using existing filters. It also allows bulk modifications to an existing policy with the use of the overwrite keyword. If overwrite is not specified, an error will occur if the destination policy ID exists.

Parameters 
ipv6-filter—
Indicates that the src-filter-id and the dst-filter-id are IPv6 filter IDs.
src-filter-id—
Identifies the source filter policy from which the copy command will attempt to copy. The filter policy must exist within the context of the preceding keyword (ip-filter, ipv6-filter or mac-filter).
dst-filter-id—
Identifies the destination filter policy to which the copy command will attempt to copy. If the overwrite keyword does not follow, the filter policy ID cannot already exist within the system for the filter type the copy command is issued for. If the overwrite keyword is present, the destination policy ID may or may not exist.
overwrite—
Specifies that the destination filter ID may exist. If it does, everything in the existing destination filter ID will be completely overwritten with the contents of the source filter ID. If the destination filter ID exists, either overwrite must be specified or an error message will be returned. If overwrite is specified, the function of copying from source to destination occurs in a “break before make” manner and therefore should be handled with care.

mac-filter

Syntax 
mac-filter src-filter-id [src-entry src-entry-id] to dst-filter-id [dst-entry dst-entry-id] [overwrite]
Context 
config>filter
Description 

This command copies existing filter list entries for a specific filter ID to another filter ID. The copy command is a configuration level maintenance tool used to create new filters using existing filters. It also allows bulk modifications to an existing policy with the use of the overwrite keyword. If overwrite is not specified, an error will occur if the destination policy ID exists.

Parameters 
mac-filter—
Indicates that the src-filter-id and the dst-filter-id are MAC filter IDs.
src-filter-id—
Identifies the source filter policy from which the copy command will attempt to copy. The filter policy must exist within the context of the preceding keyword (ip-filter, ipv6-filter or mac-filter).
dst-filter-id—
Identifies the destination filter policy to which the copy command will attempt to copy. If the overwrite keyword does not follow, the filter policy ID cannot already exist within the system for the filter type the copy command is issued for. If the overwrite keyword is present, the destination policy ID may or may not exist.
overwrite—
Specifies that the destination filter ID may exist. If it does, everything in the existing destination filter ID will be completely overwritten with the contents of the source filter ID. If the destination filter ID exists, either overwrite must be specified or an error message will be returned. If overwrite is specified, the function of copying from source to destination occurs in a “break before make” manner and therefore should be handled with care.

4.4.2.11. Model-Driven Automatic ID Commands

md-auto-id

Syntax 
md-auto-id
Context 
config>filter
Description 

This command automatically assigns numerical ID values for filter policies in model-driven management interfaces.

Classic management interfaces use a numerical filter ID as the primary key for IP filters, IPv6 filters, and MAC filters. In model-driven interfaces, IP, IPv6, and MAC filters use string names as keys. The filters can optionally be created in MD interfaces without having to explicitly select and specify a numerical filter ID. In this case, SR OS assigns an ID using the configured ID range.

filter-id-range

Syntax 
filter-id-range start filter-id end filter-id
no filter-id-range
Context 
config>filter>md-auto-id
Description 

This command specifies the range of IDs used by SR OS to automatically assign an ID to filters that are created in model-driven interfaces without an ID explicitly specified by the user or client.

A filter created with an explicitly-specified ID cannot use an ID in this range. In classic CLI and SNMP, the ID range cannot be changed while objects exist inside the previous or new range. In MD interfaces, the range can be changed, which causes any previously existing objects in the previous ID range to be deleted and re-created using a new ID in the new range.

The no form of this command removes the range values.

See the md-auto-id command for further details.

Default 

no filter-id-range

Parameters 
start filter-id
Specifies the lower value of the ID range. The value must be less than or equal to the end value.
Values—
1 to 2147483647

 

end filter-id
Specifies the upper value of the ID range. The value must be greater than or equal to the start value.
Values—
1 to 2147483647