Dell Z9500 Command Reference Manual page 242

Hide thumbs Also See for Z9500:
Table of Contents

Advertisement

The following is a list of the Dell Networking OS version history for this command.
Version
9.2(1.0)
8.3.19.0
8.3.11.1
8.3.7.0
8.3.1.0
8.2.1.0
8.1.1.0
7.6.1.0
7.5.1.0
6.5.1.0
Usage
Use the order option only when you use policy-based QoS on the switch. For
Information
more information, refer to the Quality of Service chapter in the Z9500
Configuration Guide.
When you use the log option, the CP processor logs detail the packets that match.
Depending on how many packets match the log entry and at what rate, the CP
may become busy as it has to log these packet details.
Use the monitor option only when you are using flow-based monitoring. For
more information, refer to the Port Monitoring chapter in the Z9500 Configuration
Guide.
By default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is five minutes. By default,
flow-based monitoring is not enabled.
Most ACL rules require one entry in the CAM. However, rules with TCP and UDP
port operators (for example, gt, lt, or range) may require more than one entry. The
range of ports is configured in the CAM based on bit mask boundaries; the space
required depends on exactly what ports are included in the range.
Example
An ACL rule with a TCP port range of 4000–8000 uses eight entries in the CAM.
Rule#
1 0000111110100000 1111111111100000 4000 4031 32
2 0000111111000000 1111111111000000 4032 4095 64
242
Description
Introduced on the Z9500.
Introduced on the S4820T.
Introduced on the Z9000.
Introduced on the S4810.
Added the keyword dscp.
Allows ACL control of fragmented packets for IP (Layer 3)
ACLs.
Introduced on the E-Series ExaScale.
Introduced on the S-Series.
Introduced on the C-Series.
Expanded to include the optional QoS order priority for the
ACL entry.
NOTE: When ACL logging and byte counters are configured simultaneously,
byte counters may display an incorrect value. Configure packet counters with
logging instead.
Data
Mask
From To #Covered
Access Control Lists (ACL)

Advertisement

Table of Contents
loading

Table of Contents