Reference Guide

Table Of Contents
Column Meaning
Mirror Interface On Broadcom 5650x platforms, the unit/slot/port to which packets matching this rule
are copied.
Redirect Interface On Broadcom 5650x platforms, the unit/slot/port to which packets matching
this rule are forwarded.
Time Range Name Displays the name of the time-range if the MAC ACL rule has referenced a time range.
Rule Status Status (Active/Inactive) of the MAC ACL rule.
ACL Hit Count The ACL rule hit count of packets matching the configured ACL rule within an ACL.
The following example shows CLI display output for the command.
(Extreme 220) (Routing) #show mac access-lists mac1
ACL Name: mac1
Outbound Interface(s): control-plane
Sequence Number: 10
Action.............................permit
Source MAC Address................ 00:00:00:00:AA:BB
Source MAC Mask....................FF:FF:FF:FF:00:00
Committed Rate.....................32
Committed Burst Size...............16
ACL hit count .....................0
Sequence Number: 25
Action.............................permit
Source MAC Address................ 00:00:00:00:AA:BB
Source MAC Mask....................FF:FF:FF:FF:00:00
Destination MAC Address........... 01:80:C2:00:00:00
Destination MAC Mask...............00:00:00:FF:FF:FF
Ethertype..........................ipv6
VLAN...............................36
CoS Value..........................7
Assign Queue.......................4
Redirect Interface.................0/34
Committed Rate.....................32
Committed Burst Size...............16
ACL hit count .....................0
IP Access Control List Commands
This section describes the commands used to configure IP ACL settings. IP ACLs ensure that only
authorized users have access to specific resources and block any unwarranted attempts to reach
network resources.
The following rules apply to IP ACLs:
200 Series software does not support IP ACL configuration for IP packet fragments.
The maximum number of ACLs you can create is hardware dependent. The limit applies to all ACLs,
regardless of type.
The maximum number of rules per IP ACL is hardware dependent.
Wildcard masking for ACLs operates dierently from a subnet mask. A wildcard mask is in essence
the inverse of a subnet mask. With a subnet mask, the mask has ones (1's) in the bit positions that
are used for the network address, and has zeros (0's) for the bit positions that are not used. In
contrast, a wildcard mask has (0’s) in a bit position that must be checked. A 1 in a bit position of the
ACL mask indicates the corresponding bit can be ignored.
Quality of Service Commands
ExtremeSwitching 200 Series: Command Reference Guide for version 01 .02.04.0007 626