bootps Bootstrap Protocol (BOOTP) server (67)
discard Discard (9)
dnsix DNSIX security protocol auditing (195)
domain Domain Name Service (DNS, 53)
echo Echo (7)
isakmp Internet Security Association and Key
Management Protocol (500)
mobile-ip Mobile IP registration (434)
nameserver IEN116 name service (obsolete, 42)
netbios-dgm NetBios datagram service (138)
netbios-ns NetBios name service (137)
netbios-ss NetBios session service (139)
non500-isakmp Internet Security Association and Key
Management Protocol (4500)
ntp Network Time Protocol (123)
pim-rp-disc PIM-RP-DISC(496)
rip Routing Information Protocol (router,
in.routed, 520)
snmp Simple Network Management Protocol (161)
snmptrap SNMP Traps (162)
sunrpc Sun Remote Procedure Call (111)
syslog System Logger (514)
tacacs TAC Access Control System (49)
talk Talk (517)
tftp Trivial File Transfer Protocol (69)
time Time (37)
who Who service (rwho, 513)
xdmcp X Display Manager Control Protocol (177)
destination
Enter the IP address of the network or host to which the packets are sent.
count
(OPTIONAL) Enter the keyword
count
to count the packets.
bytes
(OPTIONAL) Enter the keyword
bytes
to count the bytes.
log
(OPTIONAL) Enter the keyword
log
to enter ACL matches in the log.
dscp
(OPTIONAL) Enter the keyword
dcsp
to match to the IP DSCP values. The range is from
0 to 63.
ecn
(OPTIONAL) Enter the keyword
ecn
to match to the ECN values. The range is from 0 to
3.
order
(OPTIONAL) Enter the keyword
order
to specify the QoS order for the ACL entry. The
range is from 0 to 254 (where 0 is the highest priority and 254 is the lowest; lower-order
numbers have a higher priority). If you do not use the keyword
order
, the ACLs have the
lowest order by default (255).
monitor
(OPTIONAL) Enter the keyword
monitor
then the session–ID to describe the traffic
that you want to monitor and the ACL in which you are creating the rule is applied to the
monitored interface. The session–ID range is from 0 to 65535.
NOTE:
For more information, see “Flow-based Monitoring” in the Port
Monitoring section of the
Dell Networking OS Configuration Guide
.
fragments
Enter the keyword
fragments
to use ACLs to control packet fragments.
no-drop
Enter the keywords
no-drop
to match only the forwarded packets.
Defaults
Not configured
Command Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
222
Access Control Lists (ACL)
Содержание S6100
Страница 1: ...Dell Command Line Reference Guide for the S6100 ON System 9 11 2 0P1 ...
Страница 474: ...protocol list ttl0 ttl1 Dell 474 Control Plane Policing CoPP ...
Страница 979: ... show lldp neighbors display the LLDP neighbors Link Layer Discovery Protocol LLDP 979 ...
Страница 1627: ... uplink state group creates an uplink state group and enables the tracking of upstream links Uplink Failure Detection UFD 1627 ...