Reference Guide
• lt = less than
• range = inclusive range of ports (you must specify two 
ports for the 
port parameter)
port port Enter the application layer port number. Enter two port 
numbers if you are using the range logical operand. The 
range is 0 to 65535.
destination Enter the IP address of the network or host to which the 
packets are sent.
count (OPTIONAL) Enter the keyword count to count packets 
processed by the filter.
byte (OPTIONAL) Enter the keyword byte to count bytes 
processed by the filter.
log (OPTIONAL, E-Series only) Enter the keyword log to have 
the information kept in an ACL log file.
order (OPTIONAL) Enter the keyword order to specify the QoS 
priority for the ACL entry. The range is from 0 to 254 (where 
0 is the highest priority and 254 is the lowest; lower-order 
numbers have a higher priority). If you do not use the 
keyword order, the ACLs have the lowest order by default 
(255).
monitor (OPTIONAL) Enter the keyword monitor when the rule is 
describing the traffic that you want to monitor and the ACL 
in which you are creating the rule is applied to the monitored 
interface.
NOTE: For more information, refer to the Flow-based 
Monitoring section in the Port Monitoring chapter of the 
Dell Networking OS Configuration Guide.
fragments Enter the keyword fragments to use ACLs to control packet 
fragments.
Defaults Not configured.
Command 
Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
Command 
History
This guide is platform-specific. For command information about other platforms, 
refer to the relevant Dell Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version 
8.3.19.0
Introduced on the S4820T.
Version 8.3.11.1 Introduced on the Z9000.
Version 8.3.7.0 Introduced on the S4810.
Access Control Lists (ACL)
237










