Mac Access-List Extended - Dell C9000 Series Reference Manual

Networking command-line reference guide
Hide thumbs Also See for C9000 Series:
Table of Contents

Advertisement

Version
8.3.19.0
8.3.11.1
8.3.7.0
8.1.1.0
7.6.1.0
7.5.1.0
7.4.1.0
6.1.1.0
Usage Information When you use the log option, the CP processor logs detail the packets that match.
Depending on how many packets match the log entry and at what rate, the CP may
become busy as it has to log these packet details.
By default, 10 ACL logs are generated if you do not specify the threshold explicitly. The
default frequency at which ACL logs are generated is five minutes. By default, flow-
based monitoring is not enabled.
Use the monitor option only when you are using flow-based monitoring. For more
information, refer to the Port Monitoring chapter in the C9000 Series Configuration
Guide.
Related
permit
Commands
seq

mac access-list extended

Configure an extended MAC access control list (extended MAC ACL).
C9000 Series
Syntax
mac access-list extended access-list-name [cpu-qos]
To delete a MAC access list, use the no mac access-list extended access-
list-name [cpu-qos] command.
Description
Introduced on the S4820T.
Introduced on the Z9000.
Introduced on the S4810.
Introduced on the E-Series ExaScale.
Introduced on the S-Series.
Introduced on the C-Series.
Added the monitor option.
Introduced on the E-Series.
NOTE:
When ACL logging and byte counters are configured simultaneously, byte
counters may display an incorrect value. Configure packet counters with logging
instead.
— configures a MAC address filter to pass packets.
— configures a MAC address filter with a specified sequence number.
Access Control Lists (ACL)
344

Advertisement

Table of Contents
loading

Table of Contents