Administrator Guide

Version Description
9.7(0.0) Introduced on the S6000–ON.
9.2(1.0) Introduced on the Z9500.
9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
8.1.1.0 Introduced on the E-Series.
7.8.1.0 Increased the name string to accept up to 140 characters. Prior to 7.8.1.0, names are up to
16 characters long.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
6.1.1.0 Introduced on the E-Series.
Usage Information
Dell Networking OS supports one ingress and one egress MAC ACL per interface.
The number of entries allowed per ACL is hardware-dependent. For detailed specications about entries allowed
per ACL, see your line card documentation.
NOTE: Ingress ACLs are supported on C-Series and S-Series platforms only.
Example
Dell(conf)# mac-access-list access-list standard TestMAC
Dell(config-std-macl)# permit 00:00:00:00:00:00 00:00:00:00:ff:ff count
Dell(config-std-macl)# deny any count
Dell(config-std-macl)#
permit
To forward packets from a specic source MAC address, congure a lter.
Syntax
permit {any | mac-source-address [mac-source-address-mask]} [count [byte]] |
[log [interval minutes] [threshold-in-msgs [count]] [monitor]
To remove this lter, you have two choices:
Use the no seq sequence-number command if you know the lter’s sequence number.
Use the no permit {any | mac-source-address mac-source-address-mask} command.
Parameters
any Enter the keyword any to forward all packets received with a MAC address.
mac-source-
address
Enter a MAC address in nn:nn:nn:nn:nn:nn format.
mac-source-
address-mask
(OPTIONAL) Specify which bits in the MAC address must match. If no mask is specied,
a mask of 00:00:00:00:00:00 is applied (in other words, the lter allows only MAC
addresses that match).
count (OPTIONAL) Enter the keyword count to count packets processed by the lter.
Access Control Lists (ACL) 227