Command Line Reference Guide

port port
Enter the application layer port number. Enter two port numbers if you
are using the range logical operand. The range is 0 to 65535.
destination
Enter the IP address of the network or host to which the packets are
sent.
count (OPTIONAL) Enter the keyword count to count packets processed
by the filter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by
the filter.
order (OPTIONAL) Enter the keyword order to specify the QoS priority for
the ACL entry. The range is 0 to 254 (where 0 is the highest priority
and 254 is the lowest; lower order numbers have a higher priority). If
you do not use the keyword
order, the ACLs have the lowest order
by default (255).
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing
the traffic that you want to monitor and the ACL in which you are
creating the rule is applied to the monitored interface.
NOTE: For more information, refer to the Flow-based Monitoring
section in the Port Monitoring chapter of the
FTOS Configuration
Guide
.
fragments Enter the keyword fragments to use ACLs to control packet
fragments.
Defaults Not configured.
Command Modes CONFIGURATION-EXTENDED-ACCESS-LIST
Command History
Version 9.0(1.3) Introduced on the S5000.
Usage
Information
The order option is relevant in the context of the Policy QoS feature only. For more
information, refer to the “Quality of Service” chapter of the
FTOS Configuration Guide
.
NOTE: When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
When you use the log option, the CP processor logs details about the packets that match.
Depending on how many packets match the log entry and at what rate, the CP may become
busy as it has to log these packets’ details.
The S5000 cannot count both packets and bytes; when you enter the count byte options, only
bytes are incremented.
The monitor option is relevant in the context of flow-based monitoring only. For more
information, refer to
Port Monitoring.
Most ACL rules require one entry in the CAM. However, rules with TCP and UDP port operators
(for example, gt, lt, or range) may require more than one entry. The range of ports is configured
in the CAM based on bit mask boundaries; the space required depends on exactly what ports
are included in the range.
203