Administrator Guide

Version Description
9.10(0.1) Introduced on the S6010-ON and S4048T-ON.
9.10(0.0) Introduced on the S3148.
9.10(0.0) Introduced on the S6100-ON.
9.8(2.0) Introduced on the S3100 series.
9.8(1.0) Introduced on the Z9100–ON.
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.7(0.0) Introduced on the S6000–ON.
9.2(1.0) Introduced on the Z9500.
9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
8.5.1.0 Added support for 4-port 40G line cards on the E-Series.
8.1.1.0 Introduced on the E-Series.
7.8.1.0 Increased the name string to accept up to 140 characters. Prior to 7.8.1.0, names are up
to 16 characters long.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series
6.1.1.0 Introduced on the E-Series.
Usage Information The ACL hit counters increment the counters for each matching rule, not just the first matching rule.
Example
DellEMC# show mac accounting access-list TestMac interface gigabitethernet
1/8 in
Ingress Standard mac access-list TestMac on GigabitEthernet 1/89
Total cam count 2
seq 5 permit aa:aa:aa:aa:00:00 00:00:00:00:ff:ff count (0 packets)
seq 10 deny any count (20072594 packets)
DellEMC#
Standard MAC ACL Commands
When you create an access control list without any rule and then apply it to an interface, the ACL behavior reflects implicit permit. These
commands configure standard MAC ACLs and support both Ingress and Egress MAC ACLs.
NOTE:
For more information, also refer to the Commands Common to all ACL Types and Common MAC Access List
Commands sections.
deny
To drop packets with a the MAC address specified, configure a filter.
Syntax
deny {any | mac-source-address [mac-source-address-mask]} [count [byte]] [log]
[monitor]
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filter’s sequence number.
Use the no deny {any | mac-source-address mac-source-address-mask} command.
Access Control Lists (ACL) 217