Owners Manual
monitor (OPTIONAL) Enter the keyword monitor when the rule is
describing the traffic that you want to monitor and the ACL
in which you are creating the rule is applied to the monitored
interface. For more information, refer to the “Flow-based
Monitoring” section in the Port Monitoring chapter of the
Dell Networking OS Configuration Guide.
fragments Enter the keyword fragments to use ACLs to control packet
fragments.
Defaults Not configured.
Command
Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
Command
History
This guide is platform-specific. For command information about other platforms,
refer to the relevant Dell Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.7(0.0) Introduced on the S6000–ON.
9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
8.3.1.0 Add the DSCP value for ACL matching.
8.2.1.0 Allows ACL control of fragmented packets for IP (Layer 3)
ACLs.
8.1.1.0 Introduced on the E-Series ExaScale.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
7.4.1.0 Added support for the noncontiguous mask and added the
monitor option.
6.5.1.0 Expanded to include the optional QoS order priority for the
ACL entry.
Usage
Information
The order option is relevant in the context of the Policy QoS feature only. For
more information, refer to the Quality of Service chapter of the Dell Networking OS
Configuration Guide.
When you use the log option, the CP processor logs detail the packets that match.
Depending on how many packets match the log entry and at what rate, the CP
may become busy as it has to log these packets’ details.
Access Control Lists (ACL)
231










