Command Line Reference Guide
204 | Access Control Lists (ACL)
www.dell.com | support.dell.com
•Use the no deny ether-type protocol-type-number {destination-mac-address
mac-address-mask | any} vlan vlan-id {source-mac-address mac-address-mask | any}
command.
Parameters
Defaults
Not configured.
Command Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
Command
History
protocol-type-number
Enter a number from 600 to FFFF as the specific Ethernet type traffic to
drop.
destination-mac-address
mac-address-mask
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address must
match.
The MAC ACL supports an inverse mask, therefore, a mask of ff:ff:ff:ff:ff:ff
allows entries that do not match and a mask of 00:00:00:00:00:00 only
allows entries that match exactly.
any Enter the keyword any to match and drop specific Ethernet traffic on the
interface.
vlan vlan-id Enter the keyword vlan followed by the VLAN ID to filter traffic associated
with a specific VLAN.
Range: 1 to 4094, 1-2094 for ExaScale (can used IDs 1-4094)
To filter all VLAN traffic specify VLAN 1.
source-mac-address
mac-address-mask
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address must
match.
The MAC ACL supports an inverse mask, therefore, a mask of ff:ff:ff:ff:ff:ff
allows entries that do not match and a mask of 00:00:00:00:00:00 only
allows entries that match exactly.
count (OPTIONAL) Enter the keyword count to count packets processed by the
filter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by the filter.
log (OPTIONAL, E-Series only) Enter the keyword log to have the information
kept in an ACL log file.
order (OPTIONAL) Enter the keyword order to specify the QoS priority for the
ACL entry.
Range: 0-254 (where 0 is the highest priority and 254 is the lowest;
lower order numbers have a higher priority)
Default: If the order keyword is not used, the ACLs have the lowest order
by default (255).
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the
traffic that you want to monitor and the ACL in which you are creating the
rule will be applied to the monitored interface. For details, see the section
“Flow-based Monitoring” in the Port Monitoring chapter of the FTOS
Configuration Guide.
Version 8.2.1.0 Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
Version 8.1.1.0 Introduced on E-Series ExaScale
Version 7.4.1.0
Added monitor option
Version 6.5.10
Expanded to include the optional QoS
order priority for the ACL entry.










