Users Guide

Version Description
7.8.1.0 Increased the name string to accept up to 140 characters. Prior to 7.8.1.0, names are up to
16 characters long.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series
6.1.1.0 Introduced on the E-Series.
Usage Information The ACL hit counters increment the counters for each matching rule, not just the rst matching rule.
Example
Dell# show mac accounting access-list TestMac interface tengigabitethernet
1/8/1 in
Ingress Standard mac access-list TestMac on TenGigabitEthernet 1/89/1
Total cam count 2
seq 5 permit aa:aa:aa:aa:00:00 00:00:00:00:ff:ff count (0 packets)
seq 10 deny any count (20072594 packets)
Dell#
Standard MAC ACL Commands
When you create an access control list without any rule and then apply it to an interface, the ACL behavior reects implicit permit. These
commands congure standard MAC ACLs and support both Ingress and Egress MAC ACLs.
NOTE
: For more information, also refer to the Commands Common to all ACL Types and Common MAC Access List Commands
sections.
deny
To drop packets with a the MAC address specied, congure a lter.
Syntax
deny {any | mac-source-address [mac-source-address-mask]} [count [byte]] [log]
[monitor]
To remove this lter, you have two choices:
Use the no seq sequence-number command if you know the lter’s sequence number.
Use the no deny {any | mac-source-address mac-source-address-mask} command.
Parameters
any Enter the keyword any to specify that all routes are subject to the lter.
mac-source-
address
Enter a MAC address in nn:nn:nn:nn:nn:nn format.
mac-source-
address-mask
(OPTIONAL) Specify which bits in the MAC address must match. If no mask is specied,
a mask of 00:00:00:00:00:00 is applied (in other words, the lter allows only MAC
addresses that match).
count (OPTIONAL) Enter the keyword count to count packets processed by the lter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by the lter.
log (OPTIONAL, E-Series only) Enter the keyword log to log the packets.
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the trac that you
want to monitor and the ACL in which you are creating the rule is applied to the
Access Control Lists (ACL) 225