mac-destination-
address-mask
Specify which bits in the MAC address must match.
The MAC ACL supports an inverse mask; therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
ethertype
operator
(OPTIONAL) To filter based on protocol type, enter one of the
following Ethertypes:
•
ev2
- is the Ethernet II frame format
•
llc
- is the IEEE 802.3 frame format
•
snap
- is the IEEE 802.3 SNAP frame format
count
(OPTIONAL) Enter the keyword
count
to count packets
processed by the filter.
byte
(OPTIONAL) Enter the keyword
byte
to count bytes processed
by the filter.
log
(OPTIONAL) Enter the keyword
log
to include ACL messages in
the log.
threshold-in msgs
count
(OPTIONAL) Enter the
threshold-in-msgs
keyword followed
by a value to indicate the maximum number of ACL logs that
can be generated, exceeding which the generation of ACL logs
is terminated with the
seq
,
permit
, or
deny
commands. The
threshold range is from 1 to 100.
interval
minutes
(OPTIONAL) Enter the keyword
interval
followed by the time
period in minutes at which ACL logs must be generated. The
threshold range is from 1 to 10 minutes.
monitor
(OPTIONAL) Enter the keyword
monitor
when the rule is
describing the traffic that you want to monitor and the ACL in
which you are creating the rule is applied to the monitored
interface. For more information, refer to the “Flow-based
Monitoring” section in the Port Monitoring chapter of the
Dell
Networking OS Configuration Guide
.
Defaults
Not configured.
Command Modes
CONFIGURATION-MAC ACCESS LIST-EXTENDED
Command History This guide is platform-specific. For command information about other platforms, refer
to the relevant
Dell Networking OS Command Line Reference Guide
.
The following is a list of the Dell Networking OS version history for this command.
Version
Description
9.9(0.0)
Introduced on the C9010.
9.2(1.0)
Introduced on the Z9500.
Access Control Lists (ACL)
343
Содержание C9000 series
Страница 1: ...Dell Networking Command Line Reference Guide for the C9000 Series Version 9 10 0 0 ...
Страница 394: ...deny 14551 666 Dell Access Control Lists ACL 394 ...
Страница 877: ...algorithm FIPS Cryptography 877 ...
Страница 1297: ...Total 5 0 Total 5 active route s using 952 bytes IPv6 Basics 1297 ...
Страница 1711: ...Vl 200 Dell Policy based Routing PBR 1711 ...
Страница 2277: ...Example Dell show run vrf test3 ip vrf test3 description IT Department Virtual Routing and Forwarding VRF 2277 ...