Reference Guide

250 | Access Control Lists (ACL)
www.dell.com | support.dell.com
Defaults
Not configured.
Command Modes
CONFIGURATION-MAC ACCESS LIST-EXTENDED
Command
History
Usage
Information
When you use the log option, the CP processor logs details about the packets that
match. Depending on how many packets match the
log entry and at what rate, the CP
may become busy as it has to log these packets’ details.
Related
Commands
mac-destination-address-mask Specify which bits in the MAC address must be
matched.
The MAC ACL supports an inverse mask, therefore, a
mask of ff:ff:ff:ff:ff:ff allows entries that do not match
and a mask of 00:00:00:00:00:00 only allows entries that
match exactly.
ethertype operator
(OPTIONAL) To filter based on protocol type, enter one
of the following Ethertypes:
ev2 - is the Ethernet II frame format.
llc - is the IEEE 802.3 frame format.
snap - is the IEEE 802.3 SNAP frame format.
count
(OPTIONAL) Enter the keyword count to count packets
processed by the filter.
byte
(OPTIONAL) Enter the keyword byte to count bytes
processed by the filter.
log (OPTIONAL, E-Series only) Enter the keyword
log to
log the packets.
monitor
(OPTIONAL) Enter the keyword monitor when the rule
is describing the traffic that you want to monitor and the
ACL in which you are creating the rule will be applied to
the monitored interface. For details, refer to the section
“Flow-based Monitoring” in the Port Monitoring chapter
of the FTOS Configuration Guide.
Version 8.1.1.0 Introduced on E-Series ExaScale
Version 7.6.1.0 Support added for S-Series
Version 7.5.1.0 Support added for C-Series
Version 7.4.1.0 Added
monitor option
pre-Version 6.1.1.0 Introduced for E-Series
Note: When ACL logging and byte counters are configured simultaneously, byte
counters may display an incorrect value. Configure packet counters with logging
instead.
deny Configure a filter to drop traffic based on the MAC address.
seq Configure a filter with specific sequence numbers.