Reference Guide
214 | Access Control Lists (ACL)
www.dell.com | support.dell.com
Example
Figure 9-4. Command Example: ip access-list standard
Related
Commands
permit
c e s
Configure a filter to permit packets from a specific source IP address to leave the switch.
Syntax
permit {source [mask] | any | host ip-address} [count [byte] | log] [dscp value] [order]
[monitor]
To remove this filter, you have two choices:
• Use the no seq sequence-number command syntax if you know the filter’s sequence number
or
• Use the no permit {source [mask] | any | host ip-address} command.
Parameters
Defaults
Not configured.
Command Modes
CONFIGURATION-STANDARD-ACCESS-LIST
FTOS(conf)#ip access-list standard TestList
FTOS(config-std-nacl)#
ip access-list extended Create an extended access list.
show config Display the current configuration.
source
Enter the IP address in dotted decimal format of the network from which the
packet was sent.
mask
(OPTIONAL) Enter a network mask in /prefix format (/x) or A.B.C.D. The mask,
when specified in A.B.C.D format, may be either contiguous or non-contiguous.
any Enter the keyword any to specify that all routes are subject to the filter.
host ip-address Enter the keyword host followed by the IP address to specify a host IP address
or hostname.
count (OPTIONAL) Enter the keyword count to count packets processed by the filter.
dscp (OPTIONAL) Enter the keyword dscp to match to the IP DSCP values.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by the filter.
log (OPTIONAL, E-Series only) Enter the keyword log to enter ACL matches in the
log.
order (OPTIONAL) Enter the keyword order to specify the QoS priority for the ACL
entry.
Range: 0-254 (where 0 is the highest priority and 254 is the lowest; lower
order numbers have a higher priority)
Default: If the order keyword is not used, the ACLs have the lowest order by
default (255).
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the
traffic that you want to monitor and the ACL in which you are creating the rule
will be applied to the monitored interface. For details, see the section
“Flow-based Monitoring” in the Port Monitoring chapter of the FTOS
Configuration Guide.