Users Guide
 bootps Bootstrap Protocol (BOOTP) server (67)
 discard Discard (9)
 dnsix DNSIX security protocol auditing (195)
 domain Domain Name Service (DNS, 53)
 echo Echo (7)
 isakmp Internet Security Association and Key 
Management Protocol (500)
 mobile-ip Mobile IP registration (434)
 nameserver IEN116 name service (obsolete, 42)
 netbios-dgm NetBios datagram service (138)
 netbios-ns NetBios name service (137)
 netbios-ss NetBios session service (139)
 non500-isakmp Internet Security Association and Key 
Management Protocol (4500)
 ntp Network Time Protocol (123)
 pim-rp-disc PIM-RP-DISC(496) 
 rip Routing Information Protocol (router, 
in.routed, 520)
 snmp Simple Network Management Protocol (161)
 snmptrap SNMP Traps (162)
 sunrpc Sun Remote Procedure Call (111)
 syslog System Logger (514)
 tacacs TAC Access Control System (49)
 talk Talk (517)
 tftp Trivial File Transfer Protocol (69)
 time Time (37)
 who Who service (rwho, 513)
 xdmcp X Display Manager Control Protocol (177)
destination Enter the IP address of the network or host to which the packets are sent.
count (OPTIONAL) Enter the keyword count to count the packets.
bytes (OPTIONAL) Enter the keyword bytes to count the bytes.
log (OPTIONAL) Enter the keyword log to enter ACL matches in the log.
dscp (OPTIONAL) Enter the keyword dcsp to match to the IP DSCP values. The range is from 
0 to 63.
ecn (OPTIONAL) Enter the keyword ecn to match to the ECN values. The range is from 0 to 
3.
order (OPTIONAL) Enter the keyword order to specify the QoS order for the ACL entry. The 
range is from 0 to 254 (where 0 is the highest priority and 254 is the lowest; lower-order 
numbers have a higher priority). If you do not use the keyword order, the ACLs have the 
lowest order by default (255).
monitor (OPTIONAL) Enter the keyword monitor then the session–ID to describe the trac 
that you want to monitor and the ACL in which you are creating the rule is applied to the 
monitored interface. The session–ID range is from 0 to 65535.
NOTE: For more information, see “Flow-based Monitoring” in the Port 
Monitoring section of the 
Dell Networking OS Conguration Guide
.
fragments Enter the keyword fragments to use ACLs to control packet fragments.
no-drop Enter the keywords no-drop to match only the forwarded packets.
Defaults Not congured
Command Modes CONFIGURATION-EXTENDED-ACCESS-LIST
222 Access Control Lists (ACL)










