Users Guide

Version Description
8.3.7.0 Introduced on the S4810.
8.1.1.0 Introduced on the E-Series.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
6.1.1.0 Introduced on the E-Series.
Usage Information
When you use the log option, the CP processor logs details about the packets that match. Depending on how
many packets match the log entry and at what rate, the CP may become busy as it has to log these packets
details.
NOTE: When you congure the ACL logging and byte counters simultaneously, byte counters may
display an incorrect value. Congure packet counters with logging inst”ad.
Related Commands
denycongure a MAC ACL lter to drop packets.
seqcongure a MAC ACL lter with a specied sequence number.
seq
To a deny or permit lter in a MAC access list while creating the lter, assign a sequence number.
Syntax
deny {any | mac-source-address [mac-source-address-mask]} [count [byte]] [log
[interval minutes] [threshold-in-msgs [count]] [monitor]
To remove this lter, you have two choices:
Use the no seq sequence-number command if you know the lter’s sequence number.
Use the no deny {any | mac-source-address mac-source-address-mask} command.
Parameters
any Enter the keyword any to specify that all routes are subject to the lter.
mac-source-
address
Enter a MAC address in nn:nn:nn:nn:nn:nn format.
mac-source-
address-mask
(OPTIONAL) Specify which bits in the MAC address must match. If no mask is specied,
a mask of 00:00:00:00:00:00 is applied (in other words, the lter allows only MAC
addresses that match).
count (OPTIONAL) Enter the keyword count to count packets processed by the lter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by the lter.
log (OPTIONAL) Enter the keyword log to include ACL messages in the log.
threshold-in msgs
count
(OPTIONAL) Enter the threshold-in-msgs keyword followed by a value to indicate
the maximum number of ACL logs that can be generated, exceeding which the generation
of ACL logs is terminated with the seq, permit, or deny commands. The threshold
range is from 1 to 100.
interval minutes (OPTIONAL) Enter the keyword interval followed by the time period in minutes at
which ACL logs must be generated. The threshold range is from 1 to 10 minutes.
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the trac that you
want to monitor and the ACL in which you are creating the rule is applied to the
218 Access Control Lists (ACL)