Usage
Information
The
order
option is relevant in the context of the Policy QoS feature only. For more
information, refer to the “Quality of Service” chapter of the
FTOS Configuration Guide
.
When you use the
log
option, the CP processor logs details about the packets that match.
Depending on how many packets match the log entry and at what rate, the CP may become
busy as it has to log these packets’ details.
The
monitor
option is relevant in the context of flow-based monitoring only. For more
information, refer to
Port Monitoring
.
You cannot include IP, TCP, or UDP filters in an ACL configured with ARP filters.
NOTE: When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
permit ether-type
Configure a filter that allows traffic with specified types of Ethernet packets. This command is supported only on 12-port
GE line cards with SFP optics. For specifications, refer to your line card documentation.
E-Series
Syntax
permit ether-type
protocol-type-number
{
destination-mac-address
mac-address-mask
| any} vlan
vlan-id
{
source-mac-address mac-
address-mask
| any} [count [byte] | log] [order] [monitor]
To remove this filter, you have two choices:
•
Use the
no seq
sequence-number
command if you know the filter’s sequence
number.
•
Use the
no permit ether-type
protocol-type-number
{
destination-mac-address mac-address-mask
| any} vlan
vlan-id
{
source-mac-address mac-address-mask
| any}
command.
Parameters
protocol-type-
number
Enter a number from 600 to FFF as the specific Ethernet type traffic to
drop.
destination-mac-
address mac-
address-mask
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address
must match.
The MAC ACL supports an inverse mask; therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
any
Enter the keyword
any
to match and drop specific Ethernet traffic on
the interface.
vlan
vlan-id
Enter the keyword
vlan
and then enter the VLAN ID to filter traffic
associated with a specific VLAN. The range is 1 to 4094 and 1 to 2094
for ExaScale (you can use IDs 1 to 4094). To filter all VLAN traffic
specify
VLAN 1
.
245
Содержание Force10 Z9000
Страница 1: ...FTOS Command Line Reference Guide for the Z9000 System FTOS 9 1 0 0 ...
Страница 96: ...96 ...
Страница 194: ...194 ...
Страница 312: ...312 ...
Страница 540: ...540 ...
Страница 546: ...546 ...
Страница 560: ...560 ...
Страница 566: ...566 ...
Страница 590: ...action act UpdateCounter param0 1 0x01 param1 0 0x00 output truncated 590 ...
Страница 624: ...624 ...
Страница 638: ...638 ...
Страница 648: ...648 ...
Страница 659: ...Related Commands show gvrp displays the GVRP configuration 659 ...
Страница 660: ...660 ...
Страница 834: ...834 ...
Страница 854: ...854 ...
Страница 906: ...906 ...
Страница 914: ...914 ...
Страница 976: ...976 ...
Страница 990: ...990 ...
Страница 1006: ...1006 ...
Страница 1008: ...1008 ...
Страница 1026: ...1026 ...
Страница 1145: ...10 211 1 2 Outgoing interface list GigabitEthernet 8 0 1145 ...
Страница 1146: ...1146 ...
Страница 1156: ...1156 ...
Страница 1166: ...1166 ...
Страница 1180: ...1180 ...
Страница 1258: ...1258 ...
Страница 1272: ...1272 ...
Страница 1394: ...1394 ...
Страница 1400: ...1400 ...
Страница 1410: ...1410 ...
Страница 1423: ...To display the type of STP guard Portfast BPDU root or loop guard enabled on a port enter the show spanning tree 0 command 1423 ...
Страница 1424: ...1424 ...
Страница 1444: ...1444 ...
Страница 1456: ...FTOS config interface vlan 40 FTOS conf if vlan tagged TenGi 8 0 FTOS conf if vlan exit FTOS config 1456 ...
Страница 1468: ...Version 8 3 8 0 Introduced on the S4810 1468 ...
Страница 1470: ...1470 ...