Reference Guide

count (0 packets)
seq 20 deny host 00:00:00:00:00:41 host 00:00:00:00:00:49
count (0 packets)
seq 25 permit any any count (0 packets)
FTOS#
Standard MAC ACL Commands
When you create an access control list without any rule and then apply it to an interface, the ACL behavior reflects
implicit permit. These commands configure standard MAC ACLs.
The S4820T support both Ingress and Egress MAC ACLs.
NOTE: For more information, also refer to the Commands Common to all ACL Types and Common MAC Access List
Commands sections.
deny
To drop packets with a the MAC address specified, configure a filter.
S4820T
Syntax
deny {any | mac-source-address [mac-source-address-mask]}
[count [byte]] [log] [monitor]
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filter’s sequence
number.
Use the no deny {any | mac-source-address mac-source-
address-mask} command.
Parameters
any Enter the keyword any to specify that all routes are subject to the
filter.
mac-source-
address
Enter a MAC address in nn:nn:nn:nn:nn:nn format.
mac-source-
address-mask
(OPTIONAL) Specify which bits in the MAC address must match. If no
mask is specified, a mask of 00:00:00:00:00:00 is applied (in other
words, the filter allows only MAC addresses that match).
count (OPTIONAL) Enter the keyword count to count packets processed
by the filter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by
the filter.
log (OPTIONAL, E-Series only) Enter the keyword log to log the packets.
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing
the traffic that you want to monitor and the ACL in which you are
creating the rule is applied to the monitored interface. For more
218