White Papers

Table Of Contents
Version Description
9.10(0.1) Introduced on the S6010-ON and S4048T-ON.
9.10(0.0) Introduced on the S3148.
9.10(0.0) Introduced on the S6100-ON.
9.8(2.0) Introduced on the S3100 series.
9.8(1.0) Introduced on the Z9100ON.
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.7(0.0) Introduced on the S6000ON.
9.2(1.0) Introduced on the Z9500.
9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.10.0 Introduced on the S4810.
8.1.1.0 Introduced on the E-Series.
7.8.1.0 Increased the name string to accept up to 140 characters. Prior to 7.8.1.0, names
were up to 16 characters long.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
6.2.1.1 Introduced on the E-Series.
Usage
Information
The number of entries allowed per ACL is hardware-dependent. For detailed specification about entries
allowed per ACL, refer to your line card documentation.
Prior to 7.8.1.0, names are up to 16 characters long.
Example
DellEMC(conf)# ip access-list extended TESTListEXTEND
DellEMC(config-ext-nacl)#
Related
Commands
ip access-list standard configure a standard IP access list.
show config display the current configuration.
permit
To pass IP packets meeting the filter criteria, configure a filter.
Syntax
permit {source mask | any | host ip-address} {destination mask | any | host
ip-address} [ttl operator] [count [bytes]] [dscp value] [order] [fragments]
[monitor] [no-drop]
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filters sequence number.
Use the no deny {source mask | any | host ip-address} {destination mask |
any | host ip-address} command.
Parameters
source
Enter the IP address in dotted decimal format of the network from which the
packet was sent.
mask
(OPTIONAL) Enter a network mask in /prefix format (/x) or A.B.C.D. The mask,
when specified in A.B.C.D format, may be either contiguous or non-contiguous.
any Enter the keyword any to specify that all routes are subject to the filter.
Access Control Lists (ACL) 203