Access Control Lists (ACL) |
235
Command Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
Command
History
Usage
Information
The
order
option is relevant in the context of the Policy QoS feature only. See the “Quality of
Service” chapter of the
FTOS Configuration Guide
for more information.
When you use the
log
option, CP processor logs details about the packets that match. Depending on
how many packets match the
log
entry and at what rate, the CP may become busy as it has to log these
packets’ details.
The
monitor
option is relevant in the context of flow-based monitoring only. See the
You cannot include IP, TCP or UDP filters in an ACL configured with ARP filters.
permit ether-type
e
Configure a filter that allows traffic with specified types of Ethernet packets. This command is
supported only on 12-port GE line cards with SFP optics; refer to your line card documentation for
specifications.
Syntax
permit ether-type
protocol-type-number
{
destination-mac-address mac-address-mask
|
any
}
vlan
vlan-id
{
source-mac-address mac-address-mask
|
any
} [
count
[
byte
] |
log
]
[
order
] [
monitor
]
To remove this filter, use one of the following:
•
Use the
no
seq
sequence-number
command syntax if you know the filter’s sequence number
or
•
Use the
no
permit ether-type
protocol-type-number
{
destination-mac-address
mac-address-mask
|
any
}
vlan
vlan-id
{
source-mac-address mac-address-mask
|
any
}
command.
Parameters
Version 8.2.1.0
Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
Version 8.1.1.0
Introduced on E-Series ExaScale
Version 7.4.1.0
Added support for non-contiguous mask and added the
monitor
option.
Version 6.5.10
Expanded to include the optional QoS
order
priority for the ACL entry.
Note:
When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
protocol-type-number
Enter a number from 600 to FFF as the specific Ethernet type traffic to drop.
destination-mac-address
mac-address-mask
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address must
match.
The MAC ACL supports an inverse mask, therefore, a mask of ff:ff:ff:ff:ff:ff
allows entries that do not match and a mask of 00:00:00:00:00:00 only allows
entries that match exactly.
any
Enter the keyword
any
to match and drop specific Ethernet traffic on the
interface.
Summary of Contents for Force10 TeraScale C Series
Page 1: ...FTOS Command Line Reference Guide FTOS 8 4 2 7 E Series TeraScale C Series S Series S50 S25 ...
Page 164: ...164 Control and Monitoring w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 176: ...176 802 1ag w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 188: ...188 802 3ah w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 204: ...204 802 1X w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 294: ...294 Access Control Lists ACL w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 428: ...428 Border Gateway Protocol IPv4 BGPv4 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 456: ...456 Configuration Rollback w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 472: ...472 Dynamic Host Configuration Protocol DHCP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 484: ...484 Far End Failure Detection FEFD w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 682: ...682 IPv4 Routing w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 732: ...732 IPv6 Basics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 896: ...896 Layer 2 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 914: ...914 Link Layer Detection Protocol LLDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 926: ...926 Multicast Listener Discovery MLD w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 952: ...952 Multiple Spanning Tree Protocol MSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 976: ...976 Multicast w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 984: ...984 Neighbor Discovery Protocol NDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1094: ...1094 Policy based Routing PBR w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1130: ...1130 PIM Sparse Mode PIM SM w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1164: ...1164 Private VLAN PVLAN w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1276: ...1276 Rapid Spanning Tree Protocol RSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1342: ...1342 Service Provider Bridging w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1354: ...1354 sFlow w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1428: ...1428 Spanning Tree Protocol STP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1444: ...1444 Time and Network Time Protocol NTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1464: ...1464 VLAN Stacking w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1494: ...1494 Virtual Router Redundancy Protocol VRRP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1534: ...1534 C Series Diagnostics and Debugging w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1574: ...1574 E Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1592: ...1592 S Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1622: ...1622 Index w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1640: ...1640 Command Index w w w d e l l c o m s u p p o r t d e l l c o m ...