Dell C9000 Series Reference Manual page 347

Networking command-line reference guide
Hide thumbs Also See for C9000 Series:
Table of Contents

Advertisement

mac-source-
address-mask
mac-destination-
address
mac-destination-
address-mask
ethertype
operator
count
byte
log
threshold-in msgs
count
interval minutes
monitor
Defaults
Not configured.
Command Modes
CONFIGURATION-MAC ACCESS LIST-EXTENDED
(OPTIONAL) Specify which bits in the MAC address must match.
The MAC ACL supports an inverse mask; therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
Enter the destination MAC address and mask in
nn:nn:nn:nn:nn:nn format.
Specify which bits in the MAC address must be matched.
The MAC ACL supports an inverse mask; therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
(OPTIONAL) To filter based on protocol type, enter one of the
following Ethertypes:
ev2 - is the Ethernet II frame format
llc - is the IEEE 802.3 frame format
snap - is the IEEE 802.3 SNAP frame format
(OPTIONAL) Enter the keyword count to count packets the filter
processes.
(OPTIONAL) Enter the keyword byte to count bytes the filter
processes.
(OPTIONAL) Enter the keyword log to include ACL messages in
the log.
(OPTIONAL) Enter the threshold-in-msgs keyword followed
by a value to indicate the maximum number of ACL logs that
can be generated, exceeding which the generation of ACL logs
is terminated with the seq, permit, or deny commands. The
threshold range is from 1 to 100.
(OPTIONAL) Enter the keyword interval followed by the time
period in minutes at which ACL logs must be generated. The
threshold range is from 1 to 10 minutes.
(OPTIONAL) Enter the keyword monitor when the rule is
describing the traffic that you want to monitor and the ACL in
which you are creating the rule is applied to the monitored
interface. For more information, refer to the "Flow-based
Monitoring" section in the Port Monitoring chapter of the Dell
Networking OS Configuration Guide.
Access Control Lists (ACL)
347

Advertisement

Table of Contents
loading

Table of Contents