Dell Force10 Z9000 Reference Manual page 258

Ftos command line reference guide for the z9000 system ftos 9.1.(0.0)
Hide thumbs Also See for Force10 Z9000:
Table of Contents

Advertisement

permit
destination-mac-
address mac-
address-mask
any
vlan
source-mac-
address mac-
address-mask
count
byte
log
order
monitor
Defaults
Not configured
Command Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
Command History
Version 8.2.1.0
258
Enter the keyword permit to forward all traffic meeting the filter
criteria.
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address
must match.
The MAC ACL supports an inverse mask; therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
Enter the keyword any to match and drop specific Ethernet traffic on
the interface.
vlan-id
Enter the keyword vlan and then enter the VLAN ID to filter traffic
associated with a specific VLAN. The range is 1 to 4094 and 1 to 2094
for ExaScale (you can use IDs 1 to 4094). To filter all VLAN traffic
specify VLAN 1.
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address
must match.
The MAC ACL supports an inverse mask; therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
(OPTIONAL) Enter the keyword count to count packets the filter
processes.
(OPTIONAL) Enter the keyword byte to count bytes the filter
processes.
(OPTIONAL, E-Series only) Enter the keyword log to have the
information kept in an ACL log file.
(OPTIONAL) Enter the keyword order to specify the QoS priority for
the ACL entry. The range is 0 to 254 (where 0 is the highest priority
and 254 is the lowest; lower-order numbers have a higher priority). If
you do not use the keyword order, the ACLs have the lowest order
by default (255).
(OPTIONAL) Enter the keyword monitor when the rule is describing
the traffic that you want to monitor and the ACL in which you are
creating the rule is applied to the monitored interface.
NOTE: For more information, refer to the Flow-based Monitoring
section in the Port Monitoring chapter of the
Guide .
Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
FTOS Configuration

Advertisement

Table of Contents
loading

Table of Contents