Reference Guide

9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.5.1.0 Added support for the 4-port 40G line cards on ExaScale.
8.3.7.0 Introduced on the S4810.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
6.2.1.1 Introduced.
Usage
Information
show ip
accounting
access-
lists Field
Description
Extended IP... Displays the name of the IP ACL.
seq 5... Displays the filter. If the keywords count or byte were configured in the filter,
the number of packets or bytes the filter processes is displayed at the end of the
line.
order 4 Displays the QoS order of priority for the ACL entry.
Example
Dell#show ip accounting access-list
!
Standard Ingress IP access list test on TenGigabitEthernet 0/88
Total cam count 2
seq 5 permit 1.1.1.0/24 count (0 packets)
seq 10 deny 2.1.1.0/24 count (0 packets
Standard IP ACL Commands
When you create an ACL without any rule and then apply it to an interface, the ACL behavior reflects an implicit permit.
The Z9500 supports both Ingress and Egress IP ACLs.
NOTE: Also refer to the Commands Common to all ACL Types and Common IP ACL Commands sections.
deny
Configure a filter that drops IP packets meeting the filter criteria.
Z9500
Syntax
deny {source mask | any | host ip-address} [count [byte] | [dscp value]
[order] [fragments] [log [interval minutes] [threshold-in-msgs [count]]
[monitor]
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filters sequence number.
Use the no deny {source [mask] | any | host ip-address} command.
Parameters
source
Enter the IP address of the network or host from which the packets were sent.
Access Control Lists (ACL) 167