Dell Networking 2024 Reference Manual page 264

Hide thumbs Also See for Networking 2024:
Table of Contents

Advertisement

fragments—
fragments (fragment bit asserted). Not valid for rules that match L4
information such as TCP port number since that information is carried in
the initial packet.
This keyword is visible only if the protocol is IP, TCP, or UDP.
Specifies that this rule is to be logged.
log—
time-range
ACL rule as defined by the parameter time-range-name. If a time range
with the specified name does not exist and the ACL containing this ACL
rule is applied to an interface or bound to a VLAN, then the ACL rule is
applied immediately. If a time range with specified name exists and the
ACL containing this ACL rule is applied to an interface or bound to a
VLAN, then the ACL rule is applied when the time-range with specified
name becomes active. The ACL rule is removed when the time-range with
specified name becomes inactive.
assign-queue
identifier to which packets matching this rule are assigned.
{mirror | redirect}
which is the unit/slot/port to which packets matching this rule are copied
or forwarded, respectively.
rate-limit
configured rate in kbps, and burst-size in kbytes.
Rate – the committed rate in kilobits per second
Burst-size – the committed burst size in Kilobytes.
Default Configuration
No ACLs are configured by default.
Command Mode
Ipv4-Access-List Configuration mode
User Guidelines
Administrators are cautioned to specify permit and deny rule matches as fully
as is possible in order to avoid false matches. Rules that specify an IP port
value should also specify the protocol and and relevant IP addresses or
264
ACL Commands
Specifies the rule matches packets that are non-initial
time-range-name —Allows imposing time limitation on the
queue-id —Specifies the assign-queue, which is the queue
unit/slot/ port —Specifies the mirror or redirect interface
rate burst-size —Specifies the allowed rate of traffic as per the

Advertisement

Table of Contents
loading

Table of Contents