Dell C9000 Series Reference Manual page 318

Networking command-line reference guide
Hide thumbs Also See for C9000 Series:
Table of Contents

Advertisement

destination
message-type
count
byte
dscp
order
fragments
log
threshold-in msgs
count
interval minutes
monitor
Defaults
Not configured
Command Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
Command History
This guide is platform-specific. For command information about other platforms, refer
to the relevant Dell Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Enter the IP address of the network or host to which the packets
are sent.
(OPTIONAL) Enter an ICMP message type, either with the type
(and code, if necessary) numbers or with the name of the
message type. The range is from 0 to 255 for ICMP type and
from 0 to 255 for ICMP code.
(OPTIONAL) Enter the keyword count to count packets the filter
processes.
(OPTIONAL) Enter the keyword byte to count bytes the filter
processes.
(OPTIONAL) Enter the keyword dcsp to match to the IP DSCP
values. The range is from 0 to 63.
(OPTIONAL) Enter the keyword order to specify the QoS order
for the ACL entry. The range is from 0 to 254 (where 0 is the
highest priority and 254 is the lowest; lower-order numbers
have a higher priority). If you do not use the keyword order, the
ACLs have the lowest order by default (255).
Enter the keyword fragments to use ACLs to control packet
fragments.
(OPTIONAL) Enter the keyword log to include ACL matches in
the log.
(OPTIONAL) Enter the threshold-in-msgs keyword followed
by a value to indicate the maximum number of ACL logs that
can be generated, exceeding which the generation of ACL logs
is terminated with the seq, permit, or deny commands. The
threshold range is from 1 to 100.
(OPTIONAL) Enter the keyword interval followed by the time
period in minutes at which ACL logs must be generated. The
threshold range is from 1 to 10 minutes.
(OPTIONAL) Enter the keyword monitor when the rule is
describing the traffic that you want to monitor and the ACL in
which you are creating the rule is applied to the monitored
interface. For more information, refer to the "Flow-based
Monitoring" section in the Port Monitoring chapter of the Dell
Networking OS Configuration Guide.
Access Control Lists (ACL)
318

Advertisement

Table of Contents
loading

Table of Contents