seq (rules in IPv4 standard ACLs)
 
   
  Inserts filtering rules in IPv4 standard ACLs. Standard ACLs permit or deny traffic according to source address only. 
  
 Syntax
 
	  
		seq 
		 
		  seq-value 
		  { 
		  permit 
		  | 
		  deny 
		  | 
		  hard-drop 
		  } 
		  { 
		  S_IPaddress 
		  mask 
		  | 
		  host 
		  S_IPaddress 
		  | 
		  any 
		  } 
		  [ 
		  count 
		  ] 
		  [ 
		  log 
		  ] 
		  [ 
		  copy-sflow 
		  ] 
	 
 
	  
	 
 
	  
		 
		  { 
		  permit 
		  | 
		  deny 
		  | 
		  hard-drop 
		  } 
		  { 
		  S_IPaddress 
		  mask 
		  | 
		  host 
		  S_IPaddress 
		  | 
		  any 
		  } 
		  [ 
		  count 
		  ] 
		  [ 
		  log 
		  ] 
		  [ 
		  copy-sflow 
		  ] 
	 
 
	  
	  
		no 
		 
		  { 
		  permit 
		  | 
		  deny 
		  | 
		  hard-drop 
		  } 
		  { 
		  S_IPaddress 
		  mask 
		  | 
		  host 
		  S_IPaddress 
		  | 
		  any 
		  } 
		  [ 
		  count 
		  ] 
		  [ 
		  log 
		  ] 
		  [ 
		  copy-sflow 
		  ] 
	 
 
	  
	 Parameters
 
		 
		   
			 - seq 
				 
			 
- (Optional) Enables you to assign a sequence number to the rule. If you do not specify 
				seq 
				  seq-value, the rule is added at the end of the list. 
				 
				   
					 - seq-value 
					 
- Valid values range from 1 through 65535. 
					 
 
- permit 
			 
- Specifies rules to permit traffic. 
			 
- deny 
			 
- Specifies rules to deny traffic. 
			 
-  
				 
				  hard-drop 
				 
			 
-  Overrides the trap behavior for control frames. However, 
				hard-drop does not override a 
				permit for this address in a preceding rule. 
			 
- S_IPaddress 
			 
- Specifies a source address for which you want to filter the subnet. 
				 
				   
					 - mask 
					 
- Defines a mask, whose effect is to specify a subnet that includes the source address that you specified. For options to specify the mask, see the Usage Guidelines. 
					 
 
- host 
				 
			 
- Specifies a source address. 
				 
				   
					 - S_IPaddress 
					 
- The source address. 
					 
 
- any 
			 
- Specifies all source addresses. 
			 
- count 
			 
- Enables statistics for the rule. 
			 
- log 
			 
-  Enables inbound logging for the rule. In addition, the ACL log buffer must be enabled, using the 
				debug access-list-log buffer command. 
			 
- copy-sflow 
			 
- For incoming traffic, sends matching packets
						to the sFlow collector. 
Modes
 
		ACL configuration mode 
		
 
	 
 
	 Usage Guidelines
 
		 This command configures rules to permit or drop traffic based on source addresses. You can also enable counters, logging, and sFlow. 
		
 
		 
		The order of the rules in an ACL is critical, as the first matching rule stops further processing. When creating rules, specifying sequence values determines the order of rule processing. If you do not specify a sequence value, the rule is added to the end of the list. 
		
 
		You can specify a mask in either of the following ways: 
		
 
		  - Wildcard mask format—for example, 0.0.0.255. The advantage of this format is that it enables you mask any bit, for example by specifying 0.255.0.255. 
		  
-  Classless Interdomain Routing (CIDR) format—in which you specify the number of bits of the prefix. For example, appending /24 to an IPv4 address is equivalent to specifying 0.0.0.255 as wildcard mask format. 
		  
Although in a standard-ACL rule you can specify both 
		  
log and 
		  
copy-sflow, only one of the two is processed, as follows: 
		
 
		  - In a permit rule, only 
			 copy-sflow is processed. 
		  
- In a deny or hard-drop rule, only 
			 log is processed. 
		  
If you are defining rules for a QoS ACL, be aware of the following considerations for ACLs implemented under flow-based QoS. For details, refer to the 
		  
Extreme SLX-OS QoS and Traffic Management Configuration Guide.
		
 
		  - Do not include the 
			 count keyword in ACLs intended for flow-based QoS implementation, because such ACLs automatically share a common counter. 
		  
- The 
			 deny keyword functions as a "pass-through": For a match, QoS action defined for that class is not applied. 
		  
 To delete a rule from an ACL, do the relevant of the following: 
		
 
		  -  If you know the rule number, enter 
			 no seq 
			 seq-value. 
		  
-  If you do not know the rule number, type 
			 no and then enter the full syntax without 
			 seq 
				seq-value. 
		  
Examples
 
	  
		The following example shows how to create a IPv4 standard ACL, define rules for it, and apply the ACL to an interface: 
		
 
		device# configure
device(config)# ip access-list standard stdACL3
device(conf-ipacl-std)# seq 5 permit host 10.20.33.4
device(conf-ipacl-std)# seq 15 deny any
device(conf-ipacl-std)# exit
device(config)# interface ethernet 0/5
device(conf-if-eth-0/5)# ipv4 access-group stdACL3 in