Users Guide
fragments Enter the keyword fragments to use ACLs to control packet fragments.
no-drop Enter the keywords no-drop to match only the forwarded packets.
Defaults Not congured
Command Modes CONFIGURATION-STANDARD-ACCESS-LIST
Command History
This guide is platform-specic. For command information about other platforms, refer to the relevant Dell
Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.8(0.0) Added the no-drop parameter.
9.7(0.0) Introduced on the S6000–ON.
9.2(1.0) Introduced on the Z9500.
9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
8.3.1.0 Add the DSCP value for ACL matching.
8.2.1.0 Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
8.1.1.0 Introduced on the E-Series ExaScale.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
7.4.1.0 Added support for the non-contiguous mask and added the monitor option.
6.5.10 Expanded to include the optional QoS order priority for the ACL entry.
Usage Information
The order option is relevant in the context of the Policy QoS feature only. The following applies:
• The seq sequence-number command is applicable only in an ACL group.
• The order option works across ACL groups that are applied on an interface via the QoS policy
framework.
• The order option takes precedence over seq sequence-number.
• If you do not congure sequence-number, the rules with the same order value are ordered according
to their conguration order.
• If you congure sequence-number, the sequence-number is used as a tie breaker for rules with the
same order.
Related Commands
deny — congures a lter to drop packets.
permit — congures a lter to forward packets.
Access Control Lists (ACL)
215










