Reference Guide
Access Control Lists (ACL) | 251
seq
c e s
Configure a filter with a specific sequence number.
Syntax
seq sequence-number {deny | permit} {any | host mac-address | mac-source-address 
mac-source-address-mask} {any | host mac-address | mac-destination-address 
mac-destination-address-mask} [ethertype operator] [count [byte]] [log] [monitor]
Parameters
Defaults
Not configured
Command Modes
CONFIGURATION-MAC ACCESS LIST-STANDARD
sequence-number
Enter a number as the filter sequence number.
Range: zero (0) to 65535.
deny  Enter the keyword deny to drop any traffic matching this filter.
permit
Enter the keyword permit to forward any traffic matching this 
filter.
any  Enter the keyword any to filter all packets.
host mac-address 
Enter the keyword host followed by a MAC address to filter 
packets with that host address.
mac-source-address 
Enter the source MAC address in nn:nn:nn:nn:nn:nn format.
The MAC ACL supports an inverse mask, therefore, a mask of 
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of 
00:00:00:00:00:00 only allows entries that match exactly.
mac-source-address-mask
Specify which bits in the MAC address must be matched. 
mac-destination-address 
Enter the destination MAC address and mask in 
nn:nn:nn:nn:nn:nn format.
mac-destination-address-mask Specify which bits in the MAC address must be matched.
The MAC ACL supports an inverse mask, therefore, a mask of 
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of 
00:00:00:00:00:00 only allows entries that match exactly.
ethertype operator
(OPTIONAL) To filter based on protocol type, enter one of the 
following Ethertypes:
•
ev2 - is the Ethernet II frame format.
•
llc - is the IEEE 802.3 frame format.
•
snap - is the IEEE 802.3 SNAP frame format.
count
(OPTIONAL) Enter the keyword count to count packets 
processed by the filter.
byte
(OPTIONAL) Enter the keyword byte to count bytes processed 
by the filter.
log (OPTIONAL, E-Series only) Enter the keyword 
log to log the 
packets.
monitor
(OPTIONAL) Enter the keyword monitor when the rule is 
describing the traffic that you want to monitor and the ACL in 
which you are creating the rule will be applied to the monitored 
interface. For details, refer to the section “Flow-based 
Monitoring” in the Port Monitoring chapter of the FTOS 
Configuration Guide.










