Permit - Dell S6100 Configuration Manual

Hide thumbs Also See for S6100:
Table of Contents

Advertisement

permit

To pass packets matching the criteria specified, configure a filter.
Syntax
permit {any | host mac-address | mac-source-address mac-source-address-mask}
{any | host mac-address | mac-destination-address mac-destination-address-mask}
[ethertype operator] [count [byte]] | [log] [monitor]
To remove this filter, you have two choices:
Parameters
any
host
mac-source-
address
mac-source-
address-mask
mac-destination-
address
mac-destination-
address-mask
ethertype operator
count
byte
log
monitor
252
Access Control Lists (ACL)
Use the no seq sequence-number command if you know the filter's sequence number.
Use the no permit {any | host mac-address | mac-source-address mac-source-
address-mask} {any | mac-destination-address mac-destination-address-mask}
command.
Enter the keyword any to forward all packets.
Enter the keyword host then a MAC address to forward packets with that host address.
Enter a MAC address in nn:nn:nn:nn:nn:nn format.
(OPTIONAL) Specify which bits in the MAC address must match.
The MAC ACL supports an inverse mask; therefore, a mask of ff:ff:ff:ff:ff:ff allows entries
that do not match and a mask of 00:00:00:00:00:00 only allows entries that match
exactly.
Enter the destination MAC address and mask in nn:nn:nn:nn:nn:nn format.
Specify which bits in the MAC address must be matched.
The MAC ACL supports an inverse mask; therefore, a mask of ff:ff:ff:ff:ff:ff allows entries
that do not match and a mask of 00:00:00:00:00:00 only allows entries that match
exactly.
(OPTIONAL) To filter based on protocol type, enter one of the following Ethertypes:
ev2 - is the Ethernet II frame format
llc - is the IEEE 802.3 frame format
snap - is the IEEE 802.3 SNAP frame format
(OPTIONAL) Enter the keyword count to count packets the filter processes.
(OPTIONAL) Enter the keyword byte to count bytes the filter processes.
(OPTIONAL, E-Series only) Enter the keyword log to log the packets.
(OPTIONAL) Enter the keyword monitor when the rule is describing the traffic that you
want to monitor and the ACL in which you are creating the rule is applied to the
monitored interface.
NOTE:
Monitoring" section of the
For more information, see Flow-based Monitoring in the "Port
Dell Networking OS Configuration Guide .

Advertisement

Table of Contents
loading

Table of Contents