Administrator Guide

Table Of Contents
Usage
Information
When you use the log option, the CP processor logs details about the packets that
match. Depending on how many packets match the log entry and at what rate, the
CP may become busy as it has to log these packets’ details.
NOTE: When you configure the ACL logging and byte counters
simultaneously, byte counters may display an incorrect value. Configure
packet counters with logging instead.
Related
Commands
deny — configures a filter to drop packets.
permit — configures a filter to forward packets.
Extended MAC ACL Commands
When an access-list is created without any rule and then applied to an interface, ACL behavior reflects
implicit permit. The following commands configure Extended MAC ACLs.
The Z9000 supports both Ingress and Egress MAC ACLs.
NOTE: For more information, also refer to the Commands Common to all ACL Types and Common
MAC Access List Commands sections.
deny
To drop packets that match the filter criteria, configure a filter.
Syntax
deny {any | host mac-address | mac-source-address mac-source-
address-mask} {any | host mac-address | mac-destination-address
mac-destination-address-mask} [ethertype-operator] [count
[byte]] [log] [monitor]
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filter’s
sequence number.
Use the no deny {any | host mac-address | mac-source-address
mac-source-address-mask} {any | host mac-address | mac-
destination-address mac-destination-address-mask
} command.
Parameters
any Enter the keyword any to drop all packets.
host mac-
address
Enter the keyword host and then enter a MAC address to
drop packets with that host address.
mac-source-
address
Enter a MAC address in nn:nn:nn:nn:nn:nn format.
mac-source-
address-mask
Specify which bits in the MAC address must match.
236
Access Control Lists (ACL)