seq ether-type
Configure an egress filter with a specific sequence number that filters traffic with specified types of Ethernet packets.
This command is supported only on 12-port GE line cards with SFP optics. For specifications, refer to your line card
documentation.
E-Series
Syntax
seq
sequence-number
{deny | permit} ether-type
protocol-type-
number
{
destination-mac-address mac-address-mask
| any} vlan
vlan-id
{
source-mac-address mac-address-mask
| any} [count
[byte] | log] [order] [monitor]
To remove this filter, use the no seq
sequence-number
command.
Parameters
sequence-
number
Enter a number from 0 to 4294967290.
deny
Enter the keyword
deny
to drop all traffic meeting the filter criteria..
permit
Enter the keyword
permit
to forward all traffic meeting the filter
criteria.
destination-mac-
address mac-
address-mask
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address
must match.
The MAC ACL supports an inverse mask; therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
any
Enter the keyword
any
to match and drop specific Ethernet traffic on
the interface.
vlan
vlan-id
Enter the keyword
vlan
and then enter the VLAN ID to filter traffic
associated with a specific VLAN. The range is 1 to 4094 and 1 to 2094
for ExaScale (you can use IDs 1 to 4094). To filter all VLAN traffic
specify
VLAN 1
.
source-mac-
address mac-
address-mask
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address
must match.
The MAC ACL supports an inverse mask; therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
count
(OPTIONAL) Enter the keyword
count
to count packets the filter
processes.
byte
(OPTIONAL) Enter the keyword
byte
to count bytes the filter
processes.
log
(OPTIONAL, E-Series only) Enter the keyword
log
to have the
information kept in an ACL log file.
279
Содержание Force10 S4810P
Страница 1: ...FTOS Command Line Reference Guide for the S4810 System FTOS 9 1 0 0 ...
Страница 48: ...48 ...
Страница 62: ...62 ...
Страница 92: ...92 ...
Страница 102: ...102 ...
Страница 202: ...202 ...
Страница 216: ...216 ...
Страница 334: ...334 ...
Страница 564: ...564 ...
Страница 570: ...570 ...
Страница 594: ...594 ...
Страница 632: ...632 ...
Страница 642: ...642 ...
Страница 662: ...662 ...
Страница 670: ...Related Commands clear ip dhcp snooping clears the contents of the DHCP binding table 670 ...
Страница 688: ...688 ...
Страница 702: ...702 ...
Страница 712: ...712 ...
Страница 723: ...Related Commands show gvrp displays the GVRP configuration 723 ...
Страница 724: ...724 ...
Страница 736: ...736 ...
Страница 900: ...900 ...
Страница 934: ...934 ...
Страница 958: ...958 ...
Страница 966: ...966 ...
Страница 1018: ...1018 ...
Страница 1026: ...1026 ...
Страница 1086: ...1086 ...
Страница 1100: ...1100 ...
Страница 1116: ...1116 ...
Страница 1164: ...1164 ...
Страница 1268: ...1268 ...
Страница 1276: ...1276 ...
Страница 1286: ...1286 ...
Страница 1300: ...1300 ...
Страница 1376: ...1376 ...
Страница 1390: ...1390 ...
Страница 1460: ...1460 ...
Страница 1512: ...1512 ...
Страница 1518: ...1518 ...
Страница 1528: ...1528 ...
Страница 1538: ...1538 ...
Страница 1551: ...To display the type of STP guard Portfast BPDU root or loop guard enabled on a port enter the show spanning tree 0 command 1551 ...
Страница 1552: ...1552 ...
Страница 1572: ...1572 ...
Страница 1586: ... uplink state group creates an uplink state group and enables the tracking of upstream links 1586 ...
Страница 1598: ...FTOS config interface vlan 40 FTOS conf if vlan tagged TenGi 8 0 FTOS conf if vlan exit FTOS config 1598 ...
Страница 1612: ...1612 ...