Service Manual

destination-mac-
address mac-
address-mask
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address must match.
The MAC ACL supports an inverse mask; therefore, a mask of ff:ff:ff:ff:ff:ff allows
entries that do not match and a mask of 00:00:00:00:00:00 only allows entries that
match exactly.
any Enter the keyword any to match and drop specific Ethernet traffic on the interface.
vlan vlan-id Enter the keyword vlan and then enter the VLAN ID to filter traffic associated with a
specific VLAN. The range is 1 to 4094 and 1 to 2094 for ExaScale (you can use IDs 1 to
4094). To filter all VLAN traffic specify VLAN 1.
source-mac-
address mac-
address-mask
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address must match.
The MAC ACL supports an inverse mask; therefore, a mask of ff:ff:ff:ff:ff:ff allows
entries that do not match and a mask of 00:00:00:00:00:00 only allows entries that
match exactly.
count (OPTIONAL) Enter the keyword count to count packets processed by the filter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by the filter.
order (OPTIONAL) Enter the keyword order to specify the QoS priority for the ACL entry.
The range is 0 to 254 (where 0 is the highest priority and 254 is the lowest; lower order
numbers have a higher priority). If you do not use the keyword order, the ACLs have
the lowest order by default (255).
log (OPTIONAL) Enter the keyword log to enable the triggering of ACL log messages.
interval minutes (OPTIONAL) Enter the keyword interval followed by the time period in minutes at
which ACL logs must be generated. You can enter an interval in the range of 1-10
minutes.
threshold-in msgs
count
(OPTIONAL) Enter the threshold-in msgs keyword followed by a value to indicate
the maximum number of ACL logs that can be generated, exceeding which the
generation of ACL logs is terminated. with the seq, permit, or deny commands. The
threshold range is from 1 to 100.
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the traffic that
you want to monitor and the ACL in which you are creating the rule is applied to the
monitored interface.
NOTE: For more information, refer to the Flow-based Monitoring section in
the Port Monitoring chapter of the
Dell Networking OS Configuration Guide
.
Defaults
By default, 10 ACL logs are generated if you do not specify the threshold explicitly. The default frequency at which
ACL logs are generated is five minutes. By default, flow-based monitoring is not enabled.
Command Modes CONFIGURATION-EXTENDED-ACCESS-LIST
Command History
Version Description
9.9(0.0) Introduced on the FN IOM.
220 Access Control Lists (ACL)