Administrator Guide

order (OPTIONAL) Enter the keyword order to specify the QoS priority for the ACL
entry. The range is from 0 to 254 (where 0 is the highest priority and 254 is the
lowest; lower-order numbers have a higher priority). If you do not use the keyword
order, the ACLs have the lowest order by default (255).
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the traffic
that you want to monitor and the ACL in which you are creating the rule is applied
to the monitored interface. For more information, refer to the Flow-based
Monitoring section in the Port Monitoring chapter of the Dell Networking OS
Configuration Guide.
fragments Enter the keyword fragments to use ACLs to control packet fragments.
Defaults Not configured.
Command Modes CONFIGURATION-EXTENDED-ACCESS-LIST
Command
History
This guide is platform-specific. For command information about other platforms, refer to the relevant Dell
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.9(0.0) Introduced on the C9010.
9.2(1.0) Introduced on the Z9500.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
8.3.1.0 Added the keyword dscp.
8.2.1.0 Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
8.1.1.0 Introduced on the E-Series ExaScale.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
7.4.1.0 Added support for non-contiguous mask and added the monitor option.
Deprecated the keyword established.
6.5.10 Expanded to include the optional QoS order priority for the ACL entry.
Usage
Information
Use the order option only when you use policy-based QoS on the switch. For more information, refer to
the Quality of Service chapter in the C9000 Configuration Guide.
When you use the log option, the CP processor logs detail the packets that match. Depending on how
many packets match the log entry and at what rate, the CP may become busy as it has to log these
packet details.
Use the monitor option only when you are using flow-based monitoring. For more information, refer to
the Port Monitoring chapter in the C9000 Configuration Guide.
NOTE: When ACL logging and byte counters are configured simultaneously, byte counters may
display an incorrect value. Configure packet counters with logging instead.
Most ACL rules require one entry in the CAM. However, rules with TCP and UDP port operators (for
example, gt, lt, or range) may require more than one entry. The range of ports is configured in the CAM
based on bit mask boundaries; the space required depends on exactly what ports are included in the
range.
Example
An ACL rule with a TCP port range of 40008000 uses eight entries in the CAM.
Rule# Data Mask From To #Covered
Access Control Lists (ACL) 249