|
|
This chapter explains the function and syntax of the IP services commands. For more information about defaults and usage guidelines, see the corresponding chapter of the Cisco IOS IP and IP Routing Command Reference, Release 12.1.
To restrict incoming and outgoing connections between a particular virtual terminal line (into a Cisco device) and the addresses in an access list, use the access-class line configuration command. To remove access restrictions, use the no form of this command.
access-class access-list-number {in | out}
Syntax Description
access-list-number Number of an IP access list. This is a decimal number from 1 to 199 or from 1300 to 2699. in Restricts incoming connections between a particular Cisco device and the addresses in the access list. out Restricts outgoing connections between a particular Cisco device and the addresses in the access list.
To define an extended IP access list, use the extended version of the access-list global configuration command. To remove the access lists, use the no form of this command.
access-list access-list-number [dynamic dynamic-name [timeout minutes]] {deny | permit} protocol source source-wildcard destination destination-wildcard [precedence precedence] [tos tos] [log] [time-range time-range-name] Internet Control Message Protocol (ICMP)
For ICMP, you can also use the following syntax:
access-list access-list-number [dynamic dynamic-name [timeout minutes]] {deny | permit} icmp source source-wildcard destination destination-wildcard [icmp-type [icmp-code] | icmp-message] [precedence precedence] [tos tos] [log] [time-range time-range-name] Internet Group Management Protocol (IGMP)
For IGMP, you can also use the following syntax:
access-list access-list-number [dynamic dynamic-name [timeout minutes]] {deny | permit} igmp source source-wildcard destination destination-wildcard [igmp-type] [precedence precedence] [tos tos] [log] [time-range time-range-name] Transmission Control Protocol (TCP)
For TCP, you can also use the following syntax:
access-list access-list-number [dynamic dynamic-name [timeout minutes]] {deny | permit} tcp source source-wildcard [operator [port]] destination destination-wildcard [operator [port]] [established] [precedence precedence] [tos tos] [log] [time-range time-range-name] User Datagram Protocol (UDP)
For UDP, you can also use the following syntax:
access-list access-list-number [dynamic dynamic-name [timeout minutes]] {deny | permit} udp source source-wildcard [operator [port]] destination destination-wildcard [operator [port]] [precedence precedence] [tos tos] [log] [time-range time-range-name]
Syntax Description
access-list-number Number of an access list. This is a decimal number from 100 to 199. dynamic dynamic-name (Optional) Identifies this access list as a dynamic access list. Refer to lock-and-key access documented in the chapter "Configuring Lock-and-Key Security (Dynamic Access Lists)" in the Cisco IOS Security Configuration Guide. timeout minutes (Optional) Specifies the absolute length of time (in minutes) that a temporary access list entry can remain in a dynamic access list. The default is an infinite length of time and allows an entry to remain permanently. Refer to lock-and-key access documented in the chapter "Configuring Lock-and-Key Security (Dynamic Access Lists)" in the Cisco IOS Security Configuration Guide. deny Denies access if the conditions are matched. permit Permits access if the conditions are matched. protocol Name or number of an IP protocol. It can be one of the keywords eigrp, gre, icmp, igmp, igrp, ip, ipinip, nos, ospf, tcp, or udp, or an integer in the range 0 to 255 representing an IP protocol number. To match any Internet protocol (including ICMP, TCP, and UDP) use the keyword ip. Some protocols allow further qualifiers described below. source Number of the network or host from which the packet is being sent. There are three alternative ways to specify the source: source-wildcard Wildcard bits to be applied to source. There are three alternative ways to specify the source wildcard: destination Number of the network or host to which the packet is being sent. There are three alternative ways to specify the destination: destination-wildcard Wildcard bits to be applied to the destination. There are three alternative ways to specify the destination wildcard: precedence precedence (Optional) Packets can be filtered by precedence level, as specified by a number from 0 to 7 or by name as listed in the section "Usage Guidelines." tos tos (Optional) Packets can be filtered by type of service level, as specified by a number from 0 to 15 or by name as listed in the section "Usage Guidelines." icmp-type (Optional) ICMP packets can be filtered by ICMP message type. The type is a number from 0 to 255. log (Optional) Causes an informational logging message about the packet that matches the entry to be sent to the console. (The level of messages logged to the console is controlled by the logging console command.) The message includes the access list number, whether the packet was permitted or denied; the protocol, whether it was TCP, UDP, ICMP or a number; and, if appropriate, the source and destination addresses and source and destination port numbers. The message is generated for the first packet that matches, and then at 5-minute intervals, including the number of packets permitted or denied in the prior 5-minute interval. time-range time-range-name (Optional) Name of the time range that applies to this statement. The name of the time range and its restrictions are specified by the time-range command. icmp-code (Optional) ICMP packets that are filtered by ICMP message type can also be filtered by the ICMP message code. The code is a number from 0 to 255. icmp-message (Optional) ICMP packets can be filtered by an ICMP message type name or ICMP message type and code name. The possible names are listed in the section "Usage Guidelines." igmp-type (Optional) IGMP packets can be filtered by IGMP message type or message name. A message type is a number from 0 to 15. IGMP message names are listed in the section "Usage Guidelines." operator (Optional) Compares source or destination ports. Possible operands include lt (less than), gt (greater than), eq (equal), neq (not equal), and range (inclusive range). If the operator is positioned after the source and source-wildcard, it must match the source port. If the operator is positioned after the destination and destination-wildcard, it must match the destination port. The range operator requires two port numbers. All other operators require one port number. port (Optional) The decimal number or name of a TCP or UDP port. A port number is a number from 0 to 65535. TCP port names are listed in the section "Usage Guidelines." TCP port names can only be used when filtering TCP. UDP port names are listed in the section "Usage Guidelines." UDP port names can only be used when filtering UDP. TCP port names can only be used when filtering TCP. UDP port names can only be used when filtering UDP. established (Optional) For the TCP protocol only: Indicates an established connection. A match occurs if the TCP datagram has the ACK or RST bits set. The nonmatching case is that of the initial TCP datagram to form a connection.
To define a standard IP access list, use the standard version of the access-list global configuration command. To remove a standard access lists, use the no form of this command.
access-list access-list-number {deny | permit} source [source-wildcard] [log]![]() |
Caution Enhancements to this command are backward compatible; migrating from releases prior to Release 10.3 will convert your access lists automatically. However, releases prior to Release 10.3 are not upwardly compatible with these enhancements. Therefore, if you save an access list with these images and then use software prior to Release 10.3, the resulting access list will not be interpreted correctly. This could cause you severe security problems. Save your old configuration file before booting these images. |
Syntax Description
access-list-number Number of an access list. This is a decimal number from 1 to 99 or from 1300 to 1999. deny Denies access if the conditions are matched. permit Permits access if the conditions are matched. source Number of the network or host from which the packet is being sent. There are two alternative ways to specify the source: source-wildcard (Optional) Wildcard bits to be applied to the source. There are two alternative ways to specify the source wildcard: log (Optional) Causes an informational logging message about the packet that matches the entry to be sent to the console. (The level of messages logged to the console is controlled by the logging console command.) The message includes the access list number, whether the packet was permitted or denied, the source address, and the number of packets. The message is generated for the first packet that matches, and then at 5-minute intervals, including the number of packets permitted or denied in the prior 5-minute interval.
To write a helpful comment (remark) for an entry in a numbered IP access list, use the access-list remark global configuration command. To remove the remark, use the no form of this command.
access-list access-list-number remark remark
Syntax Description
access-list-number Number of an IP access list. remark Comment that describes the access list entry, up to 100 characters long.
To clear the counters of an access list, use the clear access-list counters EXEC command.
clear access-list counters {access-list-number | name}
Syntax Description
access-list-number Access list number of the access list for which to clear the counters. name Name of an IP access list. The name cannot contain a space or quotation mark, and must begin with an alphabetic character to avoid ambiguity with numbered access lists.
To clear the active or checkpointed database when IP accounting is enabled, use the clear ip accounting EXEC command.
clear ip accounting [checkpoint]
Syntax Description
checkpoint (Optional) Clears the checkpointed database.
To clear all statistics being collected on Director Response Protocol (DRP) requests and replies, use the clear ip drp EXEC command.
clear ip drpSyntax Description
This command has no arguments or keywords.
To clear TCP statistics, use the clear tcp statistics priveleged EXEC command.
clear tcp statisticsSyntax Description
This command has no arguments or keywords.
To set conditions for a named IP access list, use the deny access-list configuration command. To remove a deny condition from an access list, use the no form of this command.
deny source [source-wildcard] Internet Control Message Protocol (ICMP)
For ICMP, you can also use the following syntax:
deny icmp source source-wildcard destination destination-wildcard [icmp-type [icmp-code] | icmp-message] [precedence precedence] [tos tos] [log] [time-range time-range-name] Internet Group Management Protocol (IGMP)
For IGMP, you can also use the following syntax:
deny igmp source source-wildcard destination destination-wildcard [igmp-type] [precedence precedence] [tos tos] [log] [time-range time-range-name] Transmission Control Protocol (TCP)
For TCP, you can also use the following syntax:
deny tcp source source-wildcard [operator port [port]] destination destination-wildcard [operator [port]] [established] [precedence precedence] [tos tos] [log] [time-range time-range-name] User Datagram Protocol (UDP)
For UDP, you can also use the following syntax:
deny udp source source-wildcard [operator port [port]] destination destination-wildcard [operator [port]] [precedence precedence] [tos tos] [log] [time-range time-range-name]
Syntax Description
source Number of the network or host from which the packet is being sent. There are three alternative ways to specify the source: source-wildcard Wildcard bits to be applied to the source. There are three alternative ways to specify the source wildcard: protocol Name or number of an IP protocol. It can be one of the keywords eigrp, gre, icmp, igmp, igrp, ip, ipinip, nos, ospf, tcp, or udp, or an integer in the range 0 to 255 representing an IP protocol number. To match any Internet protocol (including ICMP, TCP, and UDP), use the keyword ip. Some protocols allow further qualifiers described later. destination Number of the network or host to which the packet is being sent. There are three alternative ways to specify the destination: destination-wildcard Wildcard bits to be applied to the destination. There are three alternative ways to specify the destination wildcard: precedence precedence (Optional) Packets can be filtered by precedence level, as specified by a number from 0 to 7 or by name as listed in the "Usage Guidelines" section. tos tos (Optional) Packets can be filtered by type of service level, as specified by a number from 0 to 15 or by name as listed in the "Usage Guidelines" section of the access-list (extended) command. log (Optional) Causes an informational logging message about the packet that matches the entry to be sent to the console. (The level of messages logged to the console is controlled by the logging console command.) The message includes the access list number, whether the packet was permitted or denied; the protocol, whether it was TCP, UDP, ICMP or a number; and, if appropriate, the source and destination addresses and source and destination port numbers. The message is generated for the first packet that matches, and then at 5-minute intervals, including the number of packets permitted or denied in the prior 5-minute interval. time-range time-range-name (Optional) Name of the time range that applies to this deny statement. The name of the time range and its restrictions are specified by the time-range and absolute or periodic commands, respectively. icmp-type (Optional) ICMP packets can be filtered by ICMP message type. The type is a number from 0 to 255. icmp-code (Optional) ICMP packets which are filtered by ICMP message type can also be filtered by the ICMP message code. The code is a number from 0 to 255. icmp-message (Optional) ICMP packets can be filtered by an ICMP message type name or ICMP message type and code name. The possible names are listed in the "Usage Guidelines" section of the access-list (extended) command. igmp-type (Optional) IGMP packets can be filtered by IGMP message type or message name. A message type is a number from 0 to 15. IGMP message names are listed in the "Usage Guidelines" section of the access-list (extended) command. operator (Optional) Compares source or destination ports. Possible operands include lt (less than), gt (greater than), eq (equal), neq (not equal), and range (inclusive range). If the operator is positioned after the source and source-wildcard, it must match the source port. If the operator is positioned after the destination and destination-wildcard, it must match the destination port. The range operator requires two port numbers. All other operators require one port number. port (Optional) The decimal number or name of a TCP or UDP port. A port number is a number from 0 to 65535. TCP and UDP port names are listed in the "Usage Guidelines" section of the access-list (extended) command. TCP port names can only be used when filtering TCP. UDP port names can only be used when filtering UDP. established (Optional) For the TCP protocol only: Indicates an established connection. A match occurs if the TCP datagram has the ACK or RST bits set. The nonmatching case is that of the initial TCP datagram to form a connection.
To define a named dynamic IP access list, use the dynamic access-list configuration command. To remove the access lists, use the no form of this command.
dynamic dynamic-name [timeout minutes] {deny | permit} protocol source source-wildcard destination destination-wildcard [precedence precedence] [tos tos] [log] Internet Control Message Protocol (ICMP)
For ICMP, you can also use the following syntax:
dynamic dynamic-name [timeout minutes] {deny | permit} icmp source source-wildcard destination destination-wildcard [icmp-type [icmp-code] | icmp-message] [precedence precedence] [tos tos] [log] Internet Group Management Protocol (IGMP)
For IGMP, you can also use the following syntax:
dynamic dynamic-name [timeout minutes] {deny | permit} igmp source source-wildcard destination destination-wildcard [igmp-type] [precedence precedence] [tos tos] [log] Transmission Control Protocol (TCP)
For TCP, you can also use the following syntax:
dynamic dynamic-name [timeout minutes] {deny | permit} tcp source source-wildcard [operator [port]] destination destination-wildcard [operator [port]] [established] [precedence precedence] [tos tos] [log] User Datagram Protocol (UDP)
For UDP, you can also use the following syntax:
dynamic dynamic-name [timeout minutes] {deny | permit} udp source source-wildcard [operator [port]] destination destination-wildcard [operator [port]] [precedence precedence] [tos tos] [log]![]() |
Caution Named IP access lists will not be recognized by any software release prior to Cisco IOS Release 11.2. |
Syntax Description
dynamic-name Identifies this access list as a dynamic access list. Refer to lock-and-key access documented in the chapter "Configuring Lock-and-Key Security (Dynamic Access Lists)" in the Cisco IOS Security Configuration Guide. timeout minutes deny Denies access if the conditions are matched. permit Permits access if the conditions are matched. protocol Name or number of an IP protocol. It can be one of the keywords eigrp, gre, icmp, igmp, igrp, ip, ipinip, nos, ospf, tcp, or udp, or an integer in the range 0 to 255 representing an IP protocol number. To match any Internet protocol (including ICMP, TCP, and UDP), use the keyword ip. Some protocols allow further qualifiers described later. source Number of the network or host from which the packet is being sent. There are three alternative ways to specify the source: Use a 32-bit quantity in four-part, dotted-decimal format. source-wildcard Wildcard bits to be applied to source. There are three alternative ways to specify the source wildcard: destination Number of the network or host to which the packet is being sent. There are three alternative ways to specify the destination: destination-wildcard Wildcard bits to be applied to the destination. There are three alternative ways to specify the destination wildcard: precedence precedence (Optional) Packets can be filtered by precedence level, as specified by a number from 0 to 7 or by name as listed in the section "Usage Guidelines." tos tos (Optional) Packets can be filtered by type of service level, as specified by a number from 0 to 15 or by name as listed in the section "Usage Guidelines." log (Optional) Causes an informational logging message about the packet that matches the entry to be sent to the console. (The level of messages logged to the console is controlled by the logging console command.) The message includes the access list number, whether the packet was permitted or denied; the protocol, whether it was TCP, UDP, ICMP or a number; and, if appropriate, the source and destination addresses and source and destination port numbers. The message is generated for the first packet that matches, and then at 5-minute intervals, including the number of packets permitted or denied in the prior 5-minute interval. icmp-type (Optional) ICMP packets can be filtered by ICMP message type. The type is a number from 0 to 255. icmp-code (Optional) ICMP packets that are filtered by ICMP message type can also be filtered by the ICMP message code. The code is a number from 0 to 255. icmp-message (Optional) ICMP packets can be filtered by an ICMP message type name or ICMP message type and code name. The possible names are found in the section "Usage Guidelines." igmp-type (Optional) IGMP packets can be filtered by IGMP message type or message name. A message type is a number from 0 to 15. IGMP message names are listed in the section "Usage Guidelines." operator (Optional) Compares source or destination ports. Possible operands include lt (less than), gt (greater than), eq (equal), neq (not equal), and range (inclusive range). If the operator is positioned after the source and source-wildcard, it must match the source port. If the operator is positioned after the destination and destination-wildcard, it must match the destination port. The range operator requires two port numbers. All other operators require one port number. port (Optional) The decimal number or name of a TCP or UDP port. A port number is a number from 0 to 65535. TCP and UDP port names are listed in the "Usage Guidelines" section of the access-list (IP extended) command. TCP port names can only be used when filtering TCP. UDP port names can only be used when filtering UDP. established (Optional) For the TCP protocol only: Indicates an established connection. A match occurs if the TCP datagram has the ACK or RST bits set. The nonmatching case is that of the initial TCP datagram to form a connection.
To specify the port on which the forwarding agent will listen for wildcard and fixed affinities, use the forwarding-agent CASA-port configuration command. Use the no form of the command to disable listening on that port.
forwarding-agent number [password [timeout]]
Syntax Description
number Port numbers on which the forwarding agent will listen for wildcards broadcast from the services manager. This must match the port number defined on the services manager. password (Optional) Text password used for generating the MD5 digest. timeout (Optional) Duration in seconds during which the forwarding agent will accept the new and old password. Valid range is between 0 and 3600 seconds. The default is 180 seconds.
To control access to an interface, use the ip access-group interface configuration command. To remove the specified access group, use the no form of this command.
ip access-group {access-list-number | name}{in | out}
Syntax Description
access-list-number Number of an access list. This is a decimal number from 1 to 199 or from 1300 to 2699. name Name of an IP access list as specified by an ip access-list command. in Filters on inbound packets. out Filters on outbound packets.
To define an IP access list by name, use the ip access-list global configuration command. To remove a named IP access lists, use the no form of this command.
ip access-list {standard | extended} name![]() |
Caution Named access lists will not be recognized by any software release prior to Cisco IOS Release 11.2. |
Syntax Description
standard Specifies a standard IP access list. extended Specifies an extended IP access list. name Name of the access list. Names cannot contain a space or quotation mark, and must begin with an alphabetic character to prevent ambiguity with numbered access lists.
To enable IP accounting on an interface, use the ip accounting interface configuration command. To disable IP accounting, use the no form of this command.
ip accounting [access-violations]
Syntax Description
access-violations (Optional) Enables IP accounting with the ability to identify IP traffic that fails IP access lists.
To define filters to control the hosts for which IP accounting information is kept, use the ip accounting-list global configuration command. To remove a filter definition, use the no form of this command.
ip accounting-list ip-address wildcard
Syntax Description
ip-address IP address in dotted-decimal format. wildcard Wildcard bits to be applied to the ip-address argument.
To set the maximum number of accounting entries to be created, use the ip accounting-threshold global configuration command. To restore the default number of entries, use the no form of this command.
ip accounting-threshold threshold
Syntax Description
threshold Maximum number of entries (source and destination address pairs) that the Cisco IOS software accumulates.
To control the number of transit records that are stored in the IP accounting database, use the ip accounting-transits global configuration command. To return to the default number of records, use the no form of this command.
ip accounting-transits count
Syntax Description
count Number of transit records to store in the IP accounting database.
To configure the router to function as a forwarding agent, use the ip casa global configuration command. Use the no form of the command to disable the forwarding agent.
ip casa control-address igmp-address
Syntax Description
control-address IP address of the forwarding agent side of the services manager/forwarding agent tunnel used for sending signals. This address is unique for each forwarding agent. igmp-address IGMP address on which the forwarding agent will listen for wildcard and fixed affinities.
To control the sources of Director Response Protocol (DRP) queries to the DRP Server Agent, use the ip drp access-group global configuration command. To remove the access list, use the no form of this command.
ip drp access-group access-list-number
Syntax Description
access-list-number Number of a standard IP access list in the range from 1 to 99 or from 1300 to 1999.
Syntax Description
name-of-chain Name of the key chain containing one or more authentication keys.
To enable the Director Response Protocol (DRP) Server Agent that works with DistributedDirector, use the ip drp server global configuration command. To disable the DRP Server Agent, use the no form of this command.
ip drp serverSyntax Description
This command has no arguments or keywords.
To have the Cisco IOS software respond to Internet Control Message Protocol (ICMP) mask requests by sending ICMP Mask Reply messages, use the ip mask-reply interface configuration command. To disable this function, use the no form of this command.
ip mask-replySyntax Description
This command has no arguments or keywords.
To set the maximum transmission unit (MTU) size of IP packets sent on an interface, use the ip mtu interface configuration command. To restore the default MTU size, use the no form of this command.
ip mtu bytes
Syntax Description
bytes MTU in bytes.
To enable the sending of Internet Control Message Protocol (ICMP) Redirect messages if the Cisco IOS software is forced to resend a packet through the same interface on which it was received, use the ip redirects interface configuration command. To disable the sending of redirect messages, use the no form of this command.
ip redirectsSyntax Description
This command has no arguments or keywords.
To allow the Cisco IOS software to handle IP datagrams with source routing header options, use the ip source-route global configuration command. To have the software discard any IP datagram containing a source-route option, use the no form of this command.
ip source-routeSyntax Description
This command has no arguments or keywords.
Syntax Description
characters Maximum number of characters that Telnet or rlogin can read in one read instruction. The default value is 0, which Telnet and rlogin interpret as the largest possible 32-bit positive number.
To specify the total number of TCP header compression connections that can exist on an interface, use the ip tcp compression-connections interface configuration command. To restore the default, use the no form of this command.
ip tcp compression-connections number
Syntax Description
number Number of TCP header compression connections the cache supports, in the range from 3 to 1000. The default is 32 connections (16 calls).
To enable TCP header compression, use the ip tcp header-compression interface configuration command. To disable compression, use the no form of this command.
ip tcp header-compression [passive]
Syntax Description
passive (Optional) Compresses outgoing TCP packets only if incoming TCP packets on the same interface are compressed. If you do not specify the passive keyword, the Cisco IOS software compresses all traffic.
To enable Path MTU Discovery for all new TCP connections from the router, use the ip tcp path-mtu-discovery interface configuration command. To disable the function, use the no form of this command.
ip tcp path-mtu-discovery [age-timer {minutes | infinite}]
Syntax Description
age-timer minutes (Optional) Time interval (in minutes) after which TCP re-estimates the Path MTU with a larger maximum segment size (MSS). The maximum is 30 minutes; the default is 10 minutes. age-timer infinite (Optional) Turns off the age-timer.
To alter the maximum TCP outgoing queue per connection, use the ip tcp queuemax global configuration command. To restore the default value, use the no form of this command.
ip tcp queuemax packets
Syntax Description
packets Outgoing queue size of TCP packets. The default value is 5 segments if the connection has a TTY associated with it. If there is no TTY associated with it, the default value is 20 segments.
To enable TCP selective acknowledgment, use the ip tcp selective-ack global configuration command. To disable TCP selective acknowledgment, use the no form of this command.
ip tcp selective-ackSyntax Description
This command has no arguments or keywords.
Syntax Description
seconds Time in seconds the software waits while attempting to establish a TCP connection. It can be an integer from 5 to 300 seconds. The default is 30 seconds.
To enable TCP time stamp, use the ip tcp timestamp global configuration command. To disable TCP timestamp, use the no form of this command.
ip tcp timestampSyntax Description
This command has no arguments or keywords.
Syntax Description
bytes Window size in bytes. The maximum is 65535 bytes. The default value is 2144 bytes.
To enable the generation of Internet Control Message Protocol (ICMP) Unreachable messages, use the ip unreachables interface configuration command. To disable this function, use the no form of this command.
ip unreachablesSyntax Description
This command has no arguments or keywords.
To set conditions for a named IP access list, use the permit access-list configuration command. To remove a condition from an access list, use the no form of this command.
permit source [source-wildcard] Internet Control Message Protocol (ICMP)
For ICMP, you can also use the following syntax:
permit icmp source source-wildcard destination destination-wildcard [icmp-type [icmp-code] | icmp-message] [precedence precedence] [tos tos] [log] [time-range time-range-name] Internet Group Management Protocol (IGMP)
For IGMP, you can also use the following syntax:
permit igmp source source-wildcard destination destination-wildcard [igmp-type] [precedence precedence] [tos tos] [log] [time-range time-range-name] Transmission Control Protocol (TCP)
For TCP, you can also use the following syntax:
permit tcp source source-wildcard [operator [port]] destination destination-wildcard [operator [port]] [established] [precedence precedence] [tos tos] [log] [time-range time-range-name] User Datagram Protocol (UDP)
For UDP, you can also use the following syntax:
permit udp source source-wildcard [operator [port]] destination destination-wildcard [operator [port]] [precedence precedence] [tos tos] [log] [time-range time-range-name]
Syntax Description
source Number of the network or host from which the packet is being sent. There are three alternative ways to specify the source: source-wildcard Wildcard bits to be applied to source. There are three alternative ways to specify the source wildcard: protocol Name or number of an IP protocol. It can be one of the keywords eigrp, gre, icmp, igmp, igrp, ip, ipinip, nos, ospf, tcp, or udp, or an integer in the range 0 to 255 representing an IP protocol number. To match any Internet protocol (including ICMP, TCP, and UDP), use the keyword ip. Some protocols allow further qualifiers described later. destination Number of the network or host to which the packet is being sent. There are three alternative ways to specify the destination: destination-wildcard Wildcard bits to be applied to the destination. There are three alternative ways to specify the destination wildcard: precedence precedence (Optional) Packets can be filtered by precedence level, as specified by a number from 0 to 7 or by name as listed in the section "Usage Guidelines." tos tos (Optional) Packets can be filtered by type of service level, as specified by a number from 0 to 15 or by name as listed in the "Usage Guidelines" section of the access-list (IP extended) command. log (Optional) Causes an informational logging message about the packet that matches the entry to be sent to the console. (The level of messages logged to the console is controlled by the logging console command.) The message includes the access list number, whether the packet was permitted or denied; the protocol, whether it was TCP, UDP, ICMP or a number; and, if appropriate, the source and destination addresses and source and destination port numbers. The message is generated for the first packet that matches, and then at 5-minute intervals, including the number of packets permitted or denied in the prior 5-minute interval. time-range time-range-name (Optional) Name of the time range that applies to this permit statement. The name of the time range and its restrictions are specified by the time-range and absolute or periodic commands, respectively. icmp-type (Optional) ICMP packets can be filtered by ICMP message type. The type is a number from 0 to 255. icmp-code (Optional) ICMP packets which are filtered by ICMP message type can also be filtered by the ICMP message code. The code is a number from 0 to 255. icmp-message (Optional) ICMP packets can be filtered by an ICMP message type name or ICMP message type and code name. The possible names are found in the "Usage Guidelines" section of the access-list (IP extended) command. igmp-type (Optional) IGMP packets can be filtered by IGMP message type or message name. A message type is a number from 0 to 15. IGMP message names are listed in the "Usage Guidelines" section of the access-list (IP extended) command. operator (Optional) Compares source or destination ports. Possible operands include lt (less than), gt (greater than), eq (equal), neq (not equal), and range (inclusive range). If the operator is positioned after the source and source-wildcard, it must match the source port. If the operator is positioned after the destination and destination-wildcard, it must match the destination port. The range operator requires two port numbers. All other operators require one port number. port (Optional) The decimal number or name of a TCP or UDP port. A port number is a number from 0 to 65535. TCP and UDP port names are listed in the "Usage Guidelines" section of the access-list (IP extended) command. TCP port names can only be used when filtering TCP. UDP port names can only be used when filtering UDP. established (Optional) For the TCP protocol only: Indicates an established connection. A match occurs if the TCP datagram has the ACK or RST bits set. The nonmatching case is that of the initial TCP datagram to form a connection.
To write a helpful comment (remark) for an entry in a named IP access list, use the remark access-list configuration command. To remove the remark, use the no form of this command.
remark remark
Syntax Description
remark Comment that describes the access-list entry, up to 100 characters long.
To display the contents of current access lists, use the show access-lists privileged EXEC command.
show access-lists [access-list-number | name]
Syntax Description
access-list-number (Optional) Number of the access list to display. The system displays all access lists by default. name (Optional) Name of the IP access list to display.
To display the contents of all current IP access lists, use the show ip access-list EXEC command.
show ip access-list [access-list-number | name]
Syntax Description
access-list-number (Optional) Number of the IP access list to display. name (Optional) Name of the IP access list to display.
To display the active accounting or checkpointed database or to display access list violations, use the show ip accounting EXEC command.
show ip accounting [checkpoint] [output-packets | access-violations]
Syntax Description
To display statistics about affinities, use the show ip casa affinities EXEC command.
show ip casa affinities [stats] | [saddr ipaddr [detail]] | [daddr ipaddr [detail]] | sport sport [detail]] | dport dport [detail]] | protocol protocol [detail]]
Syntax Description
stats (Optional) Displays limited statistics. saddr ipaddr (Optional) Displays source address of a given TCP connection. detail (Optional) Displays detailed statistics. daddr ipaddr (Optional) Displays destination address of a given TCP connection. sport sport (Optional) Displays source port of a given TCP connection. dport dport (Optional) Displays destination port of a given TCP connection. protocol protocol (Optional) Displays protocol of a given TCP connection.
To display operational information about the forwarding agent, use the show ip casa oper EXEC command.
show ip casa operSyntax Description
This command has no arguments or keywords.
To display statistical information about the forwarding agent, use the show ip casa stats EXEC command.
show ip casa statsSyntax Description
This command has no arguments or keywords.
To display information about wildcard blocks, use the show ip casa wildcard EXEC command.
show ip casa wildcard [detail]
Syntax Description
detail (Optional) Displays detailed statistics.
To display information about the Director Response Protocol (DRP) Server Agent for DistributedDirector, use the show ip drp EXEC command.
show ip drpSyntax Description
This command has no arguments or keywords.
To display the address of a default gateway (router) and the address of hosts for which an Internet Control Message Protocol (ICMP) Redirect message has been received, use the show ip redirects EXEC command.
show ip redirectsSyntax Description
This command has no arguments or keywords.
To display statistics about TCP header compression, use the show ip tcp header-compression EXEC command.
show ip tcp header-compressionSyntax Description
This command has no arguments or keywords.
To display statistics about IP traffic, use the show ip traffic EXEC command.
show ip trafficSyntax Description
This command has no arguments or keywords.
To display Hot Standby Router Protocol (HSRP) information, use the show standby EXEC command.
show standby [type number [group]] [brief]
Syntax Description
type number (Optional) Interface type and number for which output is displayed. group (Optional) Group number on the interface for which output is displayed. brief (Optional) A single line of output summarizes each standby group.
To display TCP statistics, use the show tcp statistics EXEC command.
show tcp statisticsSyntax Description
This command has no arguments or keywords.
To configure an authentication string for the Hot Standby Router Protocol (HSRP), use the standby authentication interface configuration command. To delete an authentication string, use the no form of this command.
standby [group-number] authentication string
Syntax Description
group-number (Optional) Group number on the interface to which this authentication string applies. string Authentication string. It can be up to eight characters in length. The default string is cisco.
Syntax Description
group-number (Optional) Group number on the interface for which HSRP is being activated. Default is 0. ip-address (Optional) IP address of the Hot Standby Router interface. secondary (Optional) Indicates the IP address is a secondary Hot Standby Router interface. Useful on interfaces with primary and secondary addresses; you can configure primary and secondary HSRP addresses.
To change the interval at which packets are sent to refresh the MAC cache when Hot Standby Router Protocol (HSRP) is running over Fiber Distributed Data Interface (FDDI), use the standby mac-refresh interface configuration command. To restore the default value, use the no form of this command.
standby mac-refresh seconds
Syntax Description
seconds Number of seconds in the interval at which a packet is sent to refresh the MAC cache. The maximum value is 255 seconds. The default is 10 seconds.
To configure Hot Standby Router Protocol (HSRP) priority, preemption, and preemption delay, use the standby preempt or standby priority interface configuration commands. To restore the default values, use the no form of this command.
standby [group-number] priority priority [preempt [delay delay]]
Syntax Description
group-number (Optional) Group number on the interface to which the other arguments in this command apply. priority priority (Optional) Priority value that prioritizes a potential Hot Standby router. The range is 1 to 255; the default is 100. preempt delay delay (Optional) Time in seconds. The delay argument causes the local router to postpone taking over the active role for delay seconds since that router was last restarted. The range is 0 to 3600 seconds (1 hour). The default is 0 seconds (no delay).
To configure Hot Standby Router Protocol (HSRP) priority, preemption, and preemption delay, use the standby priority or standby preempt interface configuration commands. To restore the default values, use the no form of this command.
standby [group-number] priority priority [preempt [delay delay]]
Syntax Description
group-number (Optional) Group number on the interface to which the other arguments in this command apply. priority priority (Optional) Priority value that prioritizes a potential Hot Standby router. The range is 1 to 255; the default is 100. preempt delay delay (Optional) Time in seconds. The delay argument causes the local router to postpone taking over the active role for delay seconds since that router was last restarted. The range is 0 to 3600 seconds (1 hour). The default is 0 seconds (no delay).
Syntax Description
group-number (Optional) Group number on the interface to which the timers apply. The default is 0. hellotime Hello interval in seconds. This is an integer from 1 to 255. The default is 3 seconds. holdtime Time in seconds before the active or standby router is declared to be down. This is an integer from 1 to 255. The default is 10 seconds.
To configure an interface so that the Hot Standby priority changes based on the availability of other interfaces, use the standby track interface configuration command. To remove the tracking, use the no form of this command.
standby [group-number] track type number [interface-priority]
Syntax Description
group-number (Optional) Group number on the interface to which the tracking applies. type Interface type (combined with interface number) that will be tracked. number Interface number (combined with interface type) that will be tracked. interface-priority (Optional) Amount by which the Hot Standby priority for the router is decremented (or incremented) when the interface goes down (or comes back up). The default value is 10.
Syntax Description
scope interface (Optional) Specifies that this command is configured just for the subinterface on which it was entered, instead of the major interface.
To start the forwarding agent, use the start-forwarding-agent CASA-port configuration command.
start-forwarding-agent number [password [timeout]]
Syntax Description
number Port numbers on which the forwarding agent will listen for wildcards broadcast from the services manager. This must match the port number defined on the services manager. password (Optional) Text password used for generating the MD5 digest. timeout (Optional) Duration in seconds during which the forwarding agent will accept the new and old password. Valid range is between 0 and 3600 seconds. The default is 180 seconds.
To assign a transmit interface to a receive-only interface, use the transmit-interface interface configuration command. To return to normal duplex Ethernet interfaces, use the no form of this command.
transmit-interface type number
Syntax Description
type Transmit interface type to be linked with the (current) receive-only interface. number Transmit interface number to be linked with the (current) receive-only interface.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Wed Jul 26 14:02:41 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.