Reference Guide

220 | Access Control Lists (ACL)
www.dell.com | support.dell.com
Usage
Information
The order option is relevant in the context of the Policy QoS feature only. See the “Quality of
Service” chapter of the FTOS Configuration Guide for more information.
The monitor option is relevant in the context of flow-based monitoring only. See Chapter 44, Port
Monitoring.
When you use the log option, CP processor logs details about the packets that match. Depending on
how many packets match the log entry and at what rate, the CP may become busy as it has to log these
packets’ details.
You cannot include IP, TCP or UDP (Layer 3) filters in an ACL configured with ARP or Ether-type
(Layer 2) filters. Apply Layer 2 ACLs (ARP and Ether-type) to Layer 2 interfaces only.
deny ether-type
e
Configure an egress filter that drops specified types of Ethernet packets on egress ACL supported line
cards (see your line card documentation).
Syntax
deny ether-type protocol-type-number {destination-mac-address mac-address-mask | any}
vlan vlan-id {source-mac-address mac-address-mask | any} [count [byte] | log] [order]
[monitor]
To remove this filter, use one of the following:
•Use the no seq sequence-number command syntax if you know the filters sequence number or
•Use the no deny ether-type protocol-type-number {destination-mac-address
mac-address-mask | any} vlan vlan-id {source-mac-address mac-address-mask | any}
command.
Parameters
Note: When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
protocol-type-number
Enter a number from 600 to FFFF as the specific Ethernet type traffic to
drop.
destination-mac-address
mac-address-mask
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address must
match.
The MAC ACL supports an inverse mask, therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
any Enter the keyword any to match and drop specific Ethernet traffic on the
interface.
vlan vlan-id Enter the keyword vlan followed by the VLAN ID to filter traffic
associated with a specific VLAN.
Range: 1 to 4094, 1-2094 for ExaScale (can used IDs 1-4094)
To filter all VLAN traffic specify VLAN 1.