display packet-filter verbose

Use display packet-filter verbose to display application details of ACLs for packet filtering.

Syntax

In standalone mode:

display packet-filter verbose { global | interface interface-type interface-number | vlan vlan-id } { inbound | outbound } [ [ ipv6 ] { acl-number | name acl-name } ] [ slot slot-number ]

In IRF mode:

display packet-filter verbose { global | interface interface-type interface-number | vlan vlan-id } { inbound | outbound } [ [ ipv6 ] { acl-number | name acl-name } ] [ chassis chassis-number slot slot-number ]

Views

Any view

Predefined user roles

network-admin

network-operator

mdc-admin

mdc-operator

Parameters

global: Specifies all physical interfaces.

interface interface-type interface-number: Specifies an interface by its type and number.

vlan vlan-id: Specifies a VLAN by its VLAN ID.

inbound: Specifies the inbound direction.

outbound: Specifies the outbound direction.

acl-number: Specifies the number of an ACL:

name acl-name: Specifies an ACL by its name. The acl-name argument is a case-insensitive string of 1 to 63 characters. It must start with an English letter. For a basic ACL or advanced ACL, if you do not specify the ipv6 keyword, this option specifies the name of an IPv4 basic ACL or advanced ACL. If you specify the ipv6 keyword, this option specifies the name of an IPv6 basic ACL or advanced ACL.

slot slot-number: Specifies a card by its slot number. If no slot is specified, the command displays ACL application details on the main board for packet filtering. (In standalone mode.)

chassis chassis-number slot slot-number: Specifies a card on an IRF member device. The chassis-number argument represents the ID of the IRF member device, and the slot-number argument represents the number of the slot that holds the card. If no card is specified, the command displays ACL application details for packet filtering on all main boards of the IRF fabric. (In IRF mode.)

Usage guidelines

When none of acl-number and name acl-name is specified, this command displays application details of all ACLs for packet filtering.

Examples

# Display application details of all IPv4 ACLs (including IPv4 basic, IPv4 advanced, Ethernet frame header, and user-defined ACLs) for incoming packet filtering in VLAN 2.

<Sysname> display packet-filter verbose vlan 2 inbound
VLAN: 2
 In-bound policy:
  ACL 2001, Hardware-count
   rule 0 permit
   rule 5 permit source 1.1.1.1 0 (Failed)
   rule 10 permit vpn-instance test (Failed)

  ACL 2002 (Failed)

# Display application details of all IPv4 ACLs (including IPv4 basic, IPv4 advanced, Ethernet frame header, and user-defined ACLs) for incoming packet filtering on GigabitEthernet 3/0/1.

<Sysname> display packet-filter verbose interface gigabitethernet 3/0/1 inbound
Interface: GigabitEthernet3/0/1
 In-bound policy:
  ACL 2001, Hardware-count (Failed)
   rule 0 permit
   rule 5 permit source 1.1.1.1 0 (Failed)
   rule 10 permit vpn-instance test (Failed)

  ACL 2002 (Failed), Hardware-count (Failed) 

  ACL6 2000, Hardware-count
   rule 0 permit

  ACL 4000, Hardware-count

  IPv4 default action: Deny, Hardware-count (Failed)

  IPv6 default action: Deny, Hardware-count (Failed)

  MAC default action: Deny, Hardware-count

# Display application details of all IPv4 ACLs (including IPv4 basic, IPv4 advanced, Ethernet frame header, and user-defined ACLs) for incoming packet filtering on all physical interfaces.

<Sysname> display packet-filter verbose global inbound
Global:
 In-bound policy:
  ACL 2001
   rule 0 permit 
   rule 5 permit source 1.1.1.1 0 (Failed)
   rule 10 permit vpn-instance test (Failed)

  ACL 2002 (Failed)

  ACL6 2000, Hardware-count

  ACL 4000, Hardware-count
   rule 0 permit

  IPv4 default action: Deny

  IPv6 default action: Deny

  MAC default action: Deny

Table 6: Command output

Field

Description

Interface

Interface to which the ACL applies.

VLAN

VLAN to which the ACL applies.

Global

ACL application details for packet filtering on all physical interfaces.

In-bound policy

ACL used for filtering incoming traffic.

Out-bound policy

ACL used for filtering outgoing traffic.

ACL 2001

IPv4 basic ACL 2001 has been successfully applied.

ACL 2002 (Failed)

The device has failed to apply IPv4 basic ACL 2002.

Hardware-count

Successfully enables counting ACL rule matches.

Hardware-count (Failed)

The device has failed to enable counting ACL rule matches.

rule 5 permit source 1.1.1.1 0 (Failed)

The device has failed to apply rule 5 because hardware resources are not sufficient or the rule is not supported.

IPv4 default action

Packet filter default action for packets that do not match any IPv4 ACLs:

  • Deny—The default action deny has been successfully applied for packet filtering.

  • Deny (Failed)—The device has failed to apply the default action deny for packet filtering. The action permit still functions.

  • Permit—The default action permit has been successfully applied for packet filtering.

  • Hardware-count—The hardware-count feature has been successfully applied for the default action for packet filtering.

  • Hardware-count (Failed)—The device has failed to apply the hardware-count feature for the packet filtering default action.

IPv6 default action

Packet filter default action for packets that do not match any IPv6 ACLs:

  • Deny—The default action deny has been successfully applied for packet filtering.

  • Deny (Failed)—The device has failed to apply the default action deny for packet filtering. The action permit still functions.

  • Permit—The default action permit has been successfully applied for packet filtering.

  • Hardware-count—The hardware-count feature has been successfully applied for the default action for packet filtering.

  • Hardware-count (Failed)—The device has failed to apply the hardware-count feature for the packet filtering default action.

MAC default action

Packet filter default action for packets that do not match any Ethernet frame header ACLs:

  • Deny—The default action deny has been successfully applied for packet filtering.

  • Deny (Failed)—The device has failed to apply the default action deny for packet filtering. The action permit still functions.

  • Permit—The default action permit has been successfully applied for packet filtering.

  • Hardware-count—The hardware-count feature has been successfully applied for the default packet filtering action.

  • Hardware-count (Failed)—The device has failed to apply the hardware-count feature for the default packet filtering action.