Reference Guide

Access Control Lists (ACL) | 251
seq
c e s
Configure a filter with a specific sequence number.
Syntax
seq sequence-number {deny | permit} {any | host mac-address | mac-source-address
mac-source-address-mask} {any | host mac-address | mac-destination-address
mac-destination-address-mask} [ethertype operator] [count [byte]] [log] [monitor]
Parameters
Defaults
Not configured
Command Modes
CONFIGURATION-MAC ACCESS LIST-STANDARD
sequence-number
Enter a number as the filter sequence number.
Range: zero (0) to 65535.
deny Enter the keyword deny to drop any traffic matching this filter.
permit
Enter the keyword permit to forward any traffic matching this
filter.
any Enter the keyword any to filter all packets.
host mac-address
Enter the keyword host followed by a MAC address to filter
packets with that host address.
mac-source-address
Enter the source MAC address in nn:nn:nn:nn:nn:nn format.
The MAC ACL supports an inverse mask, therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
mac-source-address-mask
Specify which bits in the MAC address must be matched.
mac-destination-address
Enter the destination MAC address and mask in
nn:nn:nn:nn:nn:nn format.
mac-destination-address-mask Specify which bits in the MAC address must be matched.
The MAC ACL supports an inverse mask, therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
ethertype operator
(OPTIONAL) To filter based on protocol type, enter one of the
following Ethertypes:
ev2 - is the Ethernet II frame format.
llc - is the IEEE 802.3 frame format.
snap - is the IEEE 802.3 SNAP frame format.
count
(OPTIONAL) Enter the keyword count to count packets
processed by the filter.
byte
(OPTIONAL) Enter the keyword byte to count bytes processed
by the filter.
log (OPTIONAL, E-Series only) Enter the keyword
log to log the
packets.
monitor
(OPTIONAL) Enter the keyword monitor when the rule is
describing the traffic that you want to monitor and the ACL in
which you are creating the rule will be applied to the monitored
interface. For details, refer to the section “Flow-based
Monitoring” in the Port Monitoring chapter of the FTOS
Configuration Guide.