Dell S6100 Configuration Manual page 321

Hide thumbs Also See for S6100:
Table of Contents

Advertisement

destination
count
bytes
log
threshold-in msgs
count
interval minutes
monitor
Defaults
By default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is five minutes. By default, flow-based monitoring is not
enabled.
Command Modes
ACCESS-LIST
Command History
This guide is platform-specific. For command information about other platforms, see the relevant Dell Networking
OS Command Line Reference Guide.
Version
9.11(2.0P0)
9.10(0.0)
9.8(1.0)
9.7(0.0)
9.5(0.1)
9.4(0.0)
9.3(0.0)
Usage Information
When the configured maximum threshold is exceeded, generation of logs is stopped. When the interval at which
ACL logs are configured to be recorded expires, the subsequent, fresh interval timer is started and the packet
snmp
Simple Network Management Protocol (161)
snmptrap
SNMP Traps (162)
sunrpc
Sun Remote Procedure Call (111)
syslog
System Logger (514)
tacacs
TAC Access Control System (49)
talk
Talk (517)
tftp
Trivial File Transfer Protocol (69)
time
Time (37)
who
Who service (rwho, 513)
xdmcp
X Display Manager Control Protocol (177)
Enter the IP address of the network or host to which the packets are sent.
(OPTIONAL) Enter the keyword count to count the packets.
(OPTIONAL) Enter the keyword bytes to count the bytes.
(OPTIONAL) Enter the keyword log to enable the triggering of ACL log messages.
(OPTIONAL) Enter the threshold-in-msgs keyword followed by a value to indicate
the maximum number of ACL logs that can be generated, exceeding which the generation
of ACL logs is terminate with the seq, permit, or deny commands. The threshold
range is from 1 to 100.
(OPTIONAL) Enter the keyword interval followed by the time period in minutes at
which ACL logs must be generated. The interval range is from 1 to 10 minutes.
(OPTIONAL) Enter the keyword monitor when the rule is describing the traffic that you
want to monitor and the ACL in which you are creating the rule is applied to the
monitored interface.
Description
Included support for using logical names of a protocol to configure an IP access list in
both TCP and UDP on the S6000, S6000–ON, S6100–ON, Z9100–ON.
Introduced on the S6100.
Introduced on the Z9100–ON.
Introduced on the S6000–ON.
Introduced on the Z9500.
Added support for flow-based monitoring on the S4810, S4820T, S6000, and Z9000
platforms.
Added support for logging of ACLs on the S4810, S4820T, and Z9000 platforms.
Access Control Lists (ACL)
321

Advertisement

Table of Contents
loading

Table of Contents