Concept Guide

destination-mac-
address mac-
address-mask
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address must match.
The MAC ACL supports an inverse mask; therefore, a mask of ::::: allows entries
that do not match and a mask of 00:00:00:00:00:00 only allows entries that match
exactly.
any Enter the keyword any to match and drop specic Ethernet trac on the interface.
vlan vlan-id Enter the keyword vlan and then enter the VLAN ID to lter trac associated with a
specic VLAN. The range is 1 to 4094 and 1 to 2094 for ExaScale (you can use IDs 1 to
4094). To lter all VLAN trac specify VLAN 1.
source-mac-
address mac-
address-mask
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address must match.
The MAC ACL supports an inverse mask; therefore, a mask of ::::: allows entries
that do not match and a mask of 00:00:00:00:00:00 only allows entries that match
exactly.
count (OPTIONAL) Enter the keyword count to count packets processed by the lter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by the lter.
order (OPTIONAL) Enter the keyword order to specify the QoS priority for the ACL entry.
The range is 0 to 254 (where 0 is the highest priority and 254 is the lowest; lower order
numbers have a higher priority). If you do not use the keyword order, the ACLs have the
lowest order by default (255).
log (OPTIONAL) Enter the keyword log to enable the triggering of ACL log messages.
interval minutes (OPTIONAL) Enter the keyword interval followed by the time period in minutes at
which ACL logs must be generated. You can enter an interval in the range of 1-10 minutes.
threshold-in msgs
count
(OPTIONAL) Enter the threshold-in msgs keyword followed by a value to indicate
the maximum number of ACL logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny commands. The threshold range
is from 1 to 100.
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the trac that you
want to monitor and the ACL in which you are creating the rule is applied to the
monitored interface.
NOTE: For more information, refer to the Flow-based Monitoring section in the
Port Monitoring chapter of the
Dell Networking OS Conguration Guide
.
Defaults
By default, 10 ACL logs are generated if you do not specify the threshold explicitly. The default frequency at which
ACL logs are generated is ve minutes. By default, ow-based monitoring is not enabled.
Command Modes CONFIGURATION-EXTENDED-ACCESS-LIST
Supported Modes Full–Switch
Command History
Version Description
9.9(0.0) Introduced on the FN IOM.
Access Control Lists (ACL) 231