Service Manual
Version Description
8.3.7.0 Introduced on the S4810.
8.1.1.0 Introduced on the E-Series.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
6.1.1.0 Introduced on the E-Series.
Usage Information
When you use the log option, the CP processor logs details about the packets that match. Depending on how
many packets match the log entry and at what rate, the CP may become busy as it has to log these packets’
details.
NOTE: When you congure the ACL logging and byte counters simultaneously, byte counters may
display an incorrect value. Congure packet counters with logging inst”ad.
Related Commands
• deny — congure a MAC ACL lter to drop packets.
• seq — congure a MAC ACL lter with a specied sequence number.
seq
To a deny or permit lter in a MAC access list while creating the lter, assign a sequence number.
Syntax
deny {any | mac-source-address [mac-source-address-mask]} [count [byte]] [log
[interval minutes] [threshold-in-msgs [count]] [monitor]
To remove this lter, you have two choices:
• Use the no seq sequence-number command if you know the lter’s sequence number.
•
Use the no deny {any | mac-source-address mac-source-address-mask} command.
Parameters
any Enter the keyword any to specify that all routes are subject to the lter.
mac-source-
address
Enter a MAC address in nn:nn:nn:nn:nn:nn format.
mac-source-
address-mask
(OPTIONAL) Specify which bits in the MAC address must match. If no mask is specied,
a mask of 00:00:00:00:00:00 is applied (in other words, the lter allows only MAC
addresses that match).
count (OPTIONAL) Enter the keyword count to count packets processed by the lter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by the lter.
log (OPTIONAL) Enter the keyword log to include ACL messages in the log.
threshold-in msgs
count
(OPTIONAL) Enter the threshold-in-msgs keyword followed by a value to indicate
the maximum number of ACL logs that can be generated, exceeding which the generation
of ACL logs is terminated with the seq, permit, or deny commands. The threshold
range is from 1 to 100.
interval minutes (OPTIONAL) Enter the keyword interval followed by the time period in minutes at
which ACL logs must be generated. The threshold range is from 1 to 10 minutes.
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the trac that you
want to monitor and the ACL in which you are creating the rule is applied to the
224 Access Control Lists (ACL)