Dell C9000 Series Reference Manual page 277

Networking command-line reference guide
Hide thumbs Also See for C9000 Series:
Table of Contents

Advertisement

dscp
order
fragments
log
threshold-in msgs
count
interval minutes
monitor
Defaults
Not configured.
Command Modes
CONFIGURATION-STANDARD-ACCESS-LIST
Command History
This guide is platform-specific. For command information about other platforms, refer
to the relevant Dell Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version
9.9(0.0)
9.2(1.0)
8.3.19.0
8.3.11.1
8.3.7.0
8.3.1.0
8.2.1.0
(OPTIONAL) Enter the keyword dcsp to match to the IP DSCP
values.
(OPTIONAL) Enter the keyword order to specify the QoS
priority for the ACL entry. The range is from 0 to 254 (where 0 is
the highest priority and 254 is the lowest; lower-order numbers
have a higher priority). If you do not use the keyword order, the
ACLs have the lowest order by default (255).
Enter the keyword fragments to use ACLs to control packet
fragments.
(OPTIONAL) Enter the keyword log to include ACL messages in
the log.
(OPTIONAL) Enter the threshold-in-msgs keyword followed
by a value to indicate the maximum number of ACL logs that
can be generated, exceeding which the generation of ACL logs
is terminated with the seq, permit, or deny commands. The
threshold range is from 1 to 100.
(OPTIONAL) Enter the keyword interval followed by the time
period in minutes at which ACL logs must be generated. The
threshold range is from 1 to 10 minutes.
(OPTIONAL) Enter the keyword monitor when the rule is
describing the traffic that you want to monitor and the ACL in
which you are creating the rule is applied to the monitored
interface. For more information, refer to the "Flow-based
Monitoring" section in the Port Monitoring chapter of the Dell
Networking OS Configuration Guide.
Description
Introduced on the C9010.
Introduced on the Z9500.
Introduced on the S4820T.
Introduced on the Z9000.
Introduced on the S4810.
Add the DSCP value for ACL matching.
Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
Access Control Lists (ACL)
277

Advertisement

Table of Contents
loading

Table of Contents