dynamic-name
|
Identifies this access list as a dynamic access list. Refer to lock-and-
key access documented in the “Configuring Lock-and-Key Security (Dynamic Access Lists)” chapter in the Cisco IOS Security Configuration Guide
.
|
timeout
minutes
|
(Optional) Specifies the
absolute length of time (in minutes) that a temporary access-list entry can remain in a dynamic access list. The default is
an infinite length of time and allows an entry to remain permanently. Refer to lock-and-key access documented in the “Configuring
Lock-and-Key Security (Dynamic Access Lists)” chapter in the Cisco IOS Security Configuration Guide
.
|
deny
|
Denies access if the conditions are matched.
|
permit
|
Permits access if the conditions are matched.
|
protocol
|
Name or number of an Internet protocol. It can be one of the keywords eigrp , gre , icmp , igmp , ip , ipinip , nos , ospf , tcp , or udp , or an integer in the range from 0 to 255 representing an Internet protocol number. To match any Internet protocol (including
ICMP, TCP, and UDP), use the ip keyword. Some protocols allow further qualifiers described later.
|
source
|
Number of the network or host from which the packet is being sent. There are three alternative ways to specify the source:
-
Use a 32-bit quantity in four-part, dotted decimal format.
-
Use the any keyword as an abbreviation for a source and source-wildcard of
0.0.0.0 255.255.255.255.
-
Use host source as an abbreviation for a source and source-wildcard of source
0.0.0.0.
|
source-wildcard
|
Wildcard bits to be applied to source. There are three alternative ways to specify the source wildcard:
-
Use a 32-bit quantity in four-part, dotted decimal format. Place 1s in the bit positions you want to ignore.
-
Use the any keyword as an abbreviation for a source and source-wildcard of
0.0.0.0 255.255.255.255.
-
Use host source as an abbreviation for a source and source-wildcard of source
0.0.0.0.
|
destination
|
Number of the network or host to which the packet is being sent. There are three alternative ways to specify the destination:
-
Use a 32-bit quantity in four-part, dotted decimal format
.
-
Use the any keyword as an abbreviation for the destination and destination-wildcard of
0.0.0.0 255.255.255.255.
-
Use host destination as an abbreviation for a destination and destination-wildcard of destination
0.0.0.0.
|
destination-wildcard
|
Wildcard bits to be applied to the destination. There are three alternative ways to specify the destination wildcard:
-
Use a 32-bit quantity in four-part, dotted-decimal format. Place 1s in the bit positions you want to ignore.
-
Use the any keyword as an abbreviation for a destination and destination-wildcard of
0.0.0.0 255.255.255.255.
-
Use host destination as an abbreviation for a destination and destination-wildcard of destination 0.0.0.0.
|
precedence
precedence
|
(Optional) Packets can be filtered by precedence level, as specified by a number from 0 to 7, or by name as listed in the
section “Usage Guidelines.”
|
tos
tos
|
(Optional) Packets can be filtered by type of service (ToS) level, as specified by a number from 0 to 15, or by name as listed
in the section “Usage Guidelines.”
|
log
|
(Optional) Causes an informational
logging message about the packet that matches the entry to be sent to the console. (The level of messages logged to the console
is controlled by the logging console command.)
The
message includes the access list number, whether the packet was permitted or
denied; the protocol, whether it was TCP, UDP, ICMP, or a number; and, if appropriate, the source and destination addresses
and source and destination port numbers. The message is generated for the first packet that matches, and then at 5-minute
intervals, including the number of packets permitted or denied in the prior 5-minute interval.
The logging facility might drop some logging message packets if there are too many to be handled or if there is more than
one logging message to be handled in 1 second. This behavior prevents the router from crashing due to too many logging packets.
Therefore, the logging facility should not be used as a billing tool or an accurate source of the number of matches to an
access list.
|
fragments
|
(Optional)
The access-list entry applies to noninitial fragments of packets; the fragment is either permitted or denied accordingly.
For more details about the fragments keyword, see the “Access List Processing of Fragments” and “Fragments and Policy Routing” sections in the “Usage Guidelines”
section.
|
icmp-type
|
(Optional) ICMP packets can be filtered by ICMP message type. The type is a number from 0 to 255.
|
icmp-code
|
(Optional) ICMP packets that are filtered by ICMP message type can also be filtered by the ICMP message code. The code is
a number from 0 to 255.
|
icmp-message
|
(Optional) ICMP packets can be filtered by an ICMP message type name or ICMP message type and code name. The possible names
are found in the section “Usage Guidelines.”
|
igmp-type
|
(Optional) IGMP packets can be filtered by IGMP message type or message name. A message type is a number from 0 to 15. IGMP
message names are listed in the section “Usage Guidelines.”
|
operator
|
(Optional) Compares source or destination ports. Possible operands include lt (less than), gt (greater than), eq (equal), neq (not equal), and range (inclusive range).
If the operator is positioned after the source and source-wildcard , it must match the source port.
If the operator is positioned after the destination and destination-wildcard , it must match the destination port.
The range operator requires two port numbers. All other operators require one port number.
|
port
|
(Optional) The decimal number or name of a TCP or UDP port. A port number is a number from
0
to
65535
. TCP and UDP port names are listed in the section “Usage Guidelines” of the access-list (IP extended) command. TCP port names can only be used when filtering TCP. UDP port names can only be used when filtering
UDP.
|
established
|
(Optional) For the TCP protocol only: Indicates an established connection. A match occurs if the TCP datagram has the ACK
or RST bits set. The nonmatching case is that of the initial TCP datagram to form a connection.
|