Reference Guide
250 | Access Control Lists (ACL)
www.dell.com | support.dell.com
Defaults
Not configured.
Command Modes
CONFIGURATION-MAC ACCESS LIST-EXTENDED
Command
History
Usage
Information
When you use the log option, the CP processor logs details about the packets that 
match. Depending on how many packets match the 
log entry and at what rate, the CP 
may become busy as it has to log these packets’ details.
Related
Commands
mac-destination-address-mask Specify which bits in the MAC address must be 
matched.
The MAC ACL supports an inverse mask, therefore, a 
mask of ff:ff:ff:ff:ff:ff allows entries that do not match 
and a mask of 00:00:00:00:00:00 only allows entries that 
match exactly.
ethertype operator
(OPTIONAL) To filter based on protocol type, enter one 
of the following Ethertypes:
•
ev2 - is the Ethernet II frame format.
•
llc - is the IEEE 802.3 frame format.
•
snap - is the IEEE 802.3 SNAP frame format.
count
(OPTIONAL) Enter the keyword count to count packets 
processed by the filter.
byte
(OPTIONAL) Enter the keyword byte to count bytes 
processed by the filter.
log (OPTIONAL, E-Series only) Enter the keyword 
log to 
log the packets.
monitor
(OPTIONAL) Enter the keyword monitor when the rule 
is describing the traffic that you want to monitor and the 
ACL in which you are creating the rule will be applied to 
the monitored interface. For details, refer to the section 
“Flow-based Monitoring” in the Port Monitoring chapter 
of the FTOS Configuration Guide.
Version 8.1.1.0 Introduced on E-Series ExaScale
Version 7.6.1.0 Support added for S-Series
Version 7.5.1.0 Support added for C-Series
Version 7.4.1.0 Added 
monitor option
pre-Version 6.1.1.0 Introduced for E-Series
Note: When ACL logging and byte counters are configured simultaneously, byte 
counters may display an incorrect value. Configure packet counters with logging 
instead.
deny Configure a filter to drop traffic based on the MAC address.
seq Configure a filter with specific sequence numbers.










