Version 7.4.1.0
pre-Version
6.1.1.0
Usage
When you use the log option, the CP processor logs details about the packets that match.
Information
Depending on how many packets match the log entry and at what rate, the CP may become
busy as it has to log these packets' details.
Related
deny
Commands
permit
Extended MAC ACL Commands
When an access-list is created without any rule and then applied to an interface, ACL behavior reflects implicit permit.
The following commands configure Extended MAC ACLs.
The C-Series and S-Series platforms support Ingress MAC ACLs only.
The S4810 and Z9000 support both Ingress and Egress MAC ACLs.
NOTE: For more information, also refer to the
Commands
sections.
deny
Configure a filter to drop packets that match the filter criteria.
C-Series, E-Series, S-Series, Z-Series
Syntax
deny {any | host mac-address | mac-source-address mac-source-
address-mask} {any | host mac-address | mac-destination-address
mac-destination-address-mask} [ethertype-operator] [count
[byte]] [log] [monitor]
To remove this filter, you have two choices:
Parameters
any
host
address
270
Added the monitor option.
Introduced on the E-Series.
NOTE: When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
– configures a filter to drop packets.
– configures a filter to forward packets.
Commands Common to all ACL Types
•
Use the no seq sequence-number command if you know the filter's sequence
number.
•
Use the no deny {any | host mac-address | mac-source-address
mac-source-address-mask} {any | host mac-address | mac-
destination-address mac-destination-address-mask} command.
Enter the keyword any to drop all packets.
mac-
Enter the keyword host and then enter a MAC address to drop
packets with that host address.
and
Common MAC Access List