Users Guide
packet-too-big count
parameter-problem count
time-exceeded count
port-unreachable count
The ICMP packets cannot be ltered using mirroring ACL.
count (OPTIONAL) Enter the keyword count to count packets processed by the lter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by the lter.
log (OPTIONAL) Enter the keyword log to enable the triggering of ACL log messages.
threshold-in msgs 
count
(OPTIONAL) Enter the threshold-in-msgs keyword followed by a value to indicate 
the maximum number of ACL logs that can be generated, exceeding which the generation 
of ACL logs is terminated with the seq, permit, or deny commands. The threshold 
range is from 1 to 100.
interval minutes (OPTIONAL) Enter the keyword interval followed by the time period in minutes at 
which ACL logs must be generated. The interval range is from 1 to 10 minutes.
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the trac that you 
want to monitor and the ACL in which you are creating the rule is applied to the 
monitored interface.
Defaults
By default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is ve minutes. By default, ow-based monitoring is not 
enabled.
Command Modes ACCESS-LIST
Command History
This guide is platform-specic. For command information about other platforms, see the relevant Dell Networking 
OS Command Line Reference Guide.
Version Description
9.11(2.0P1) Added the type parameter to lter the ICMP packets based on the type and code on the 
S6000, S6000–ON, S6100–ON, Z9100–ON.
9.8(1.0) Introduced on the Z9100–ON.
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.7(0.0) Introduced on the S6000–ON.
9.5(0.1) Introduced on the Z9500.
9.4(0.0) Added support for ow-based monitoring on the S4810, S4820T, S6000, and Z9000 
platforms.
9.3(0.0) Added support for logging of ACLs on the S4810, S4820T, and Z9000 platforms.
Usage Information
When the congured maximum threshold is exceeded, generation of logs is stopped. When the interval at which 
ACL logs are congured to be recorded expires, the subsequent, fresh interval timer is started and the packet 
count for that new interval commences from zero. If ACL logging was stopped previously because the congured 
threshold is exceeded, it is re-enabled for this new interval.
302 Access Control Lists (ACL)










