Download Print this page

Dell Force10 TeraScale E Series Reference Manual page 261

Ftos command line, ftos 8.4.2.7

Advertisement

Parameters
any
host
mac-source-address
mac-source-address-mask
mac-destination-address
mac-destination-address-mask
ethertype operator
count
byte
log
monitor
Defaults
Not configured.
Command Modes
CONFIGURATION-MAC ACCESS LIST-EXTENDED
Command
Version 8.1.1.0
History
Version 7.6.1.0
Version 7.5.1.0
Version 7.4.1.0
pre-Version 6.1.1.0
Usage
When you use the log option, CP processor logs details about the packets that match. Depending on
Information
how many packets match the log entry and at what rate, the CP may become busy as it has to log these
packets' details.
Introduced on E-Series ExaScale
Support added for S-Series
Support added for C-Series
monitor
Added
Introduced for E-Series
Note:
When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
any
Enter the keyword
host
Enter the keyword
forward packets with that host address.
Enter the source MAC address in nn:nn:nn:nn:nn:nn format.
Specify which bits in the MAC address must be matched.
The MAC ACL supports an inverse mask, therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
Enter the destination MAC address and mask in
nn:nn:nn:nn:nn:nn format.
Specify which bits in the MAC address must be matched.
The MAC ACL supports an inverse mask, therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
(OPTIONAL) To filter based on protocol type, enter one of the
following Ethertypes:
ev2
- is the Ethernet II frame format.
llc
- is the IEEE 802.3 frame format.
snap
- is the IEEE 802.3 SNAP frame format.
(OPTIONAL) Enter the keyword
processed by the filter.
(OPTIONAL) Enter the keyword
processed by the filter.
(OPTIONAL, E-Series only) Enter the keyword
packets.
(OPTIONAL) Enter the keyword
describing the traffic that you want to monitor and the ACL in
which you are creating the rule will be applied to the monitored
interface. For details, see the section "Flow-based Monitoring"
in the Port Monitoring chapter of the FTOS Configuration
Guide.
option
to forward all packets.
followed by a MAC address to
count
to count packets
byte
to count bytes
log
to log the
monitor
when the rule is
Access Control Lists (ACL) | 261

Advertisement

loading