260
|
Access Control Lists (ACL)
www.dell.com | support.dell.com
Command Modes
CONFIGURATION
Command
History
Usage
Information
The number of entries allowed per ACL is hardware-dependent. Refer to your line card documentation
for detailed specification on entries allowed per ACL.
Prior to 7.8.1.0, names are up to 16 characters long.
Example
Figure 9-8. Command Example: mac-access-list extended
Related
Commands
permit
c e s
Configure a filter to pass packets matching the criteria specified.
Syntax
permit
{
any
|
host
mac-address
|
mac-source-address
mac-source-address-mask
} {
any
|
host
mac-address
|
mac-destination-address
mac-destination-address-mask
} [
ethertype
operator
] [
count
[
byte
]] | [
log
] [
monitor
]
To remove this filter, you have two choices:
•
Use the
no
seq
sequence-number
command syntax if you know the filter’s sequence number
or
•
Use the
no
permit
{
any
|
host
mac-address
|
mac-source-address
mac-source-address-mask
} {
any
|
mac-destination-address
mac-destination-address-mask
} command.
Version 8.1.1.0
Introduced on E-Series ExaScale
Version 7.8.1.0
Increased name string to accept up to 140 characters. Prior to 7.8.1.0, names are up to
16 characters long.
Version 7.6.1.0
Support added for S-Series
Version 7.5.1.0
Support added for C-Series
pre-Version 6.1.1.0
Introduced for E-Series
FTOS(conf)#
mac-access-list access-list extended TestMATExt
FTOS(config-ext-macl)#remark 5 IPv4
FTOS(config-ext-macl)#seq 10 permit any any ev2 eq 800 count bytes
FTOS(config-ext-macl)#remark 15 ARP
FTOS(config-ext-macl)#seq 20 permit any any ev2 eq 806 count bytes
FTOS(config-ext-macl)#remark 25 IPv6
FTOS(config-ext-macl)#seq 30 permit any any ev2 eq 86dd count bytes
FTOS(config-ext-macl)#seq 40 permit any any count bytes
FTOS(config-ext-macl)#exit
FTOS(conf)#do show mac accounting access-list snickers interface g0/47 in
Extended mac access-list snickers on GigabitEthernet 0/47
seq 10 permit any any ev2 eq 800 count bytes (559851886 packets 191402152148
bytes)
seq 20 permit any any ev2 eq 806 count bytes (74481486 packets 5031686754
bytes)
seq 30 permit any any ev2 eq 86dd count bytes (7751519 packets 797843521 bytes)
Configure a standard MAC access list.
show mac accounting access-list
Display
MAC access list configurations and counters (if
configured).
Summary of Contents for Force10 TeraScale C Series
Page 1: ...FTOS Command Line Reference Guide FTOS 8 4 2 7 E Series TeraScale C Series S Series S50 S25 ...
Page 164: ...164 Control and Monitoring w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 176: ...176 802 1ag w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 188: ...188 802 3ah w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 204: ...204 802 1X w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 294: ...294 Access Control Lists ACL w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 428: ...428 Border Gateway Protocol IPv4 BGPv4 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 456: ...456 Configuration Rollback w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 472: ...472 Dynamic Host Configuration Protocol DHCP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 484: ...484 Far End Failure Detection FEFD w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 682: ...682 IPv4 Routing w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 732: ...732 IPv6 Basics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 896: ...896 Layer 2 w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 914: ...914 Link Layer Detection Protocol LLDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 926: ...926 Multicast Listener Discovery MLD w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 952: ...952 Multiple Spanning Tree Protocol MSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 976: ...976 Multicast w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 984: ...984 Neighbor Discovery Protocol NDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1094: ...1094 Policy based Routing PBR w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1130: ...1130 PIM Sparse Mode PIM SM w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1164: ...1164 Private VLAN PVLAN w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1276: ...1276 Rapid Spanning Tree Protocol RSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1342: ...1342 Service Provider Bridging w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1354: ...1354 sFlow w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1428: ...1428 Spanning Tree Protocol STP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1444: ...1444 Time and Network Time Protocol NTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1464: ...1464 VLAN Stacking w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1494: ...1494 Virtual Router Redundancy Protocol VRRP w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1534: ...1534 C Series Diagnostics and Debugging w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1574: ...1574 E Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1592: ...1592 S Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1622: ...1622 Index w w w d e l l c o m s u p p o r t d e l l c o m ...
Page 1640: ...1640 Command Index w w w d e l l c o m s u p p o r t d e l l c o m ...