Users Guide

bootps Bootstrap Protocol (BOOTP) server (67)
discard Discard (9)
dnsix DNSIX security protocol auditing (195)
domain Domain Name Service (DNS, 53)
echo Echo (7)
isakmp Internet Security Association and Key
Management Protocol (500)
mobile-ip Mobile IP registration (434)
nameserver IEN116 name service (obsolete, 42)
netbios-dgm NetBios datagram service (138)
netbios-ns NetBios name service (137)
netbios-ss NetBios session service (139)
non500-isakmp Internet Security Association and Key
Management Protocol (4500)
ntp Network Time Protocol (123)
pim-rp-disc PIM-RP-DISC(496)
rip Routing Information Protocol (router,
in.routed, 520)
snmp Simple Network Management Protocol (161)
snmptrap SNMP Traps (162)
sunrpc Sun Remote Procedure Call (111)
syslog System Logger (514)
tacacs TAC Access Control System (49)
talk Talk (517)
tftp Trivial File Transfer Protocol (69)
time Time (37)
who Who service (rwho, 513)
xdmcp X Display Manager Control Protocol (177)
destination Enter the IP address of the network or host to which the packets are sent.
count (OPTIONAL) Enter the keyword count to count the packets.
bytes (OPTIONAL) Enter the keyword bytes to count the bytes.
log (OPTIONAL) Enter the keyword log to enter ACL matches in the log.
dscp (OPTIONAL) Enter the keyword dcsp to match to the IP DSCP values. The range is from
0 to 63.
ecn (OPTIONAL) Enter the keyword ecn to match to the ECN values. The range is from 0 to
3.
order (OPTIONAL) Enter the keyword order to specify the QoS order for the ACL entry. The
range is from 0 to 254 (where 0 is the highest priority and 254 is the lowest; lower-order
numbers have a higher priority). If you do not use the keyword order, the ACLs have the
lowest order by default (255).
monitor (OPTIONAL) Enter the keyword monitor then the session–ID to describe the trac
that you want to monitor and the ACL in which you are creating the rule is applied to the
monitored interface. The session–ID range is from 0 to 65535.
NOTE: For more information, see “Flow-based Monitoring” in the Port
Monitoring section of the
Dell Networking OS Conguration Guide
.
fragments Enter the keyword fragments to use ACLs to control packet fragments.
no-drop Enter the keywords no-drop to match only the forwarded packets.
Defaults Not congured
Command Modes CONFIGURATION-EXTENDED-ACCESS-LIST
222 Access Control Lists (ACL)