Dell Force10 S4810P Reference Manual page 252

Ftos command line reference guide for the s4810 system ftos 9.1.(0.0)
Hide thumbs Also See for Force10 S4810P:
Table of Contents

Advertisement

Parameters
protocol-type-
number
destination-mac-
address mac-
address-mask
any
vlan
source-mac-
address mac-
address-mask
count
byte
log
order
monitor
Defaults
Not configured.
Command Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
Command History
Version 8.2.1.0
Version 8.1.1.0
252
Enter a number from 600 to FFFF as the specific Ethernet type traffic
to drop.
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address
must match.
The MAC ACL supports an inverse mask; therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
Enter the keyword any to match and drop specific Ethernet traffic on
the interface.
vlan-id
Enter the keyword vlan and then enter the VLAN ID to filter traffic
associated with a specific VLAN. The range is 1 to 4094 and 1 to 2094
for ExaScale ( you can use IDs 1 to 4094). To filter all VLAN traffic,
specify VLAN 1.
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address
must match.
The MAC ACL supports an inverse mask; therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
(OPTIONAL) Enter the keyword count to count packets processed
by the filter.
(OPTIONAL) Enter the keyword byte to count bytes processed by
the filter.
(OPTIONAL, E-Series only) Enter the keyword log to have the
information kept in an ACL log file.
(OPTIONAL) Enter the keyword order to specify the QoS priority for
the ACL entry. The range is 0 to 254 (where 0 is the highest priority
and 254 is the lowest; lower order numbers have a higher priority) If
you did not use the keyword order, the ACLs have the lowest order
by default (255).
(OPTIONAL) Enter the keyword monitor when the rule is describing
the traffic that you want to monitor and the ACL in which you are
creating the rule is applied to the monitored interface. For more
information, refer to the section "Flow-based Monitoring" in the Port
Monitoring chapter of the
Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
Introduced on the E-Series ExaScale.
FTOS Configuration Guide .

Advertisement

Table of Contents
loading

Table of Contents