Dell S6100 Configuration Manual page 222

Hide thumbs Also See for S6100:
Table of Contents

Advertisement

destination
count
bytes
log
dscp
ecn
order
monitor
fragments
no-drop
Defaults
Not configured
Command Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
222
Access Control Lists (ACL)
bootps
Bootstrap Protocol (BOOTP) server (67)
discard
Discard (9)
dnsix
DNSIX security protocol auditing (195)
domain
Domain Name Service (DNS, 53)
echo
Echo (7)
isakmp
Internet Security Association and Key
Management Protocol (500)
mobile-ip
Mobile IP registration (434)
nameserver
IEN116 name service (obsolete, 42)
netbios-dgm
NetBios datagram service (138)
netbios-ns
NetBios name service (137)
netbios-ss
NetBios session service (139)
non500-isakmp
Internet Security Association and Key
Management Protocol (4500)
ntp
Network Time Protocol (123)
pim-rp-disc
PIM-RP-DISC(496)
rip
Routing Information Protocol (router,
in.routed, 520)
snmp
Simple Network Management Protocol (161)
snmptrap
SNMP Traps (162)
sunrpc
Sun Remote Procedure Call (111)
syslog
System Logger (514)
tacacs
TAC Access Control System (49)
talk
Talk (517)
tftp
Trivial File Transfer Protocol (69)
time
Time (37)
who
Who service (rwho, 513)
xdmcp
X Display Manager Control Protocol (177)
Enter the IP address of the network or host to which the packets are sent.
(OPTIONAL) Enter the keyword count to count the packets.
(OPTIONAL) Enter the keyword bytes to count the bytes.
(OPTIONAL) Enter the keyword log to enter ACL matches in the log.
(OPTIONAL) Enter the keyword dcsp to match to the IP DSCP values. The range is from
0 to 63.
(OPTIONAL) Enter the keyword ecn to match to the ECN values. The range is from 0 to
3.
(OPTIONAL) Enter the keyword order to specify the QoS order for the ACL entry. The
range is from 0 to 254 (where 0 is the highest priority and 254 is the lowest; lower-order
numbers have a higher priority). If you do not use the keyword order, the ACLs have the
lowest order by default (255).
(OPTIONAL) Enter the keyword monitor then the session–ID to describe the traffic
that you want to monitor and the ACL in which you are creating the rule is applied to the
monitored interface. The session–ID range is from 0 to 65535.
NOTE:
For more information, see "Flow-based Monitoring" in the Port
Monitoring section of the
Enter the keyword fragments to use ACLs to control packet fragments.
Enter the keywords no-drop to match only the forwarded packets.
Dell Networking OS Configuration Guide .

Advertisement

Table of Contents
loading

Table of Contents