Dell C9000 Series Reference Manual page 307

Networking command-line reference guide
Hide thumbs Also See for C9000 Series:
Table of Contents

Advertisement

mask
any
host ip-address
destination
dscp
count
bytes
order
fragments
log
threshold-in msgs
count
interval minutes
monitor
Defaults
Not configured.
Command Modes
CONFIGURATION-STANDARD-ACCESS-LIST
Enter a network mask in /prefix format (/x) or A.B.C.D. The mask,
when specified in A.B.C.D format, may be either contiguous or
noncontiguous.
Enter the keyword any to match and drop specific Ethernet
traffic on the interface.
Enter the keyword host and then enter the IP address to specify
a host IP address.
Enter the IP address of the network or host to which the packets
are sent.
Enter the keyword dscp to deny a packet based on the DSCP
value. The range is 0 to 63.
(OPTIONAL) Enter the keyword count to count packets the filter
processes.
(OPTIONAL) Enter the keyword byte to count bytes the filter
processes.
(OPTIONAL) Enter the keyword order to specify the QoS
priority for the ACL entry. The range is 0 to 254 (where 0 is the
highest priority and 254 is the lowest; lower-order numbers
have a higher priority). If you do not use the keyword order, the
ACLs have the lowest order by default (255).
Enter the keyword fragments to use ACLs to control packet
fragments.
(OPTIONAL) Enter the keyword log to include ACL messages in
the log.
(OPTIONAL) Enter the threshold-in-msgs keyword followed
by a value to indicate the maximum number of ACL logs that
can be generated, exceeding which the generation of ACL logs
is terminated with the seq, permit, or deny commands. The
threshold range is from 1 to 100.
(OPTIONAL) Enter the keyword interval followed by the time
period in minutes at which ACL logs must be generated. The
threshold range is from 1 to 10 minutes.
(OPTIONAL) Enter the keyword monitor when the rule is
describing the traffic that you want to monitor and the ACL in
which you are creating the rule is applied to the monitored
interface. For more information, refer to the "Flow-based
Monitoring" section in the Port Monitoring chapter of the Dell
Networking OS Configuration Guide.
Access Control Lists (ACL)
307

Advertisement

Table of Contents
loading

Table of Contents