White Papers

Table Of Contents
permit ether-type (for Extended MAC ACLs)
Configure a filter that allows traffic with specified types of Ethernet packets. This command is supported only on 12-port GE line
cards with SFP optics. For specifications, refer to your line card documentation.
Syntax
permit ether-type protocol-type-number {destination-mac-address mac-
address-mask | any} vlan vlan-id {source-mac-address mac-address-mask
| any} [count [byte]] [order] [log [intervalminutes][threshold-in-msgs]
[count]][monitor]
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filters sequence number.
Use the no permit ether-type protocol-type-number {destination-mac-address
mac-address-mask | any} vlan vlan-id {source-mac-address mac-address-mask
| any} command.
Parameters
protocol-type-
number
Enter a number from 600 to FFF as the specific Ethernet type traffic to drop.
destination-mac-
address mac-
address-mask
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address must match.
The MAC ACL supports an inverse mask; therefore, a mask of ff:ff:ff:ff:ff:ff allows
entries that do not match and a mask of 00:00:00:00:00:00 only allows entries that
match exactly.
any Enter the keyword any to match and drop specific Ethernet traffic on the
interface.
vlan
vlan-id
Enter the keyword vlan and then enter the VLAN ID to filter traffic associated
with a specific VLAN. The range is 1 to 4094 and 1 to 2094 for ExaScale (you can
use IDs 1 to 4094). To filter all VLAN traffic specify VLAN 1.
source-mac-
address mac-
address-mask
Enter a MAC address and mask in the nn:nn:nn:nn:nn format.
For the MAC address mask, specify which bits in the MAC address must match.
The MAC ACL supports an inverse mask; therefore, a mask of ff:ff:ff:ff:ff:ff allows
entries that do not match and a mask of 00:00:00:00:00:00 only allows entries that
match exactly.
count (OPTIONAL) Enter the keyword count to count packets processed by the filter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by the filter.
order (OPTIONAL) Enter the keyword order to specify the QoS priority for the ACL
entry. The range is 0 to 254 (where 0 is the highest priority and 254 is the lowest;
lower order numbers have a higher priority). If you do not use the keyword order,
the ACLs have the lowest order by default (255).
log (OPTIONAL) Enter the keyword log to enable the triggering of ACL log messages.
interval
minutes
(OPTIONAL) Enter the keyword interval followed by the time period in minutes
at which ACL logs must be generated. You can enter an interval in the range of 1-10
minutes.
threshold-in
msgs
count
(OPTIONAL) Enter the threshold-in msgs keyword followed by a value to
indicate the maximum number of ACL logs that can be generated, exceeding which
the generation of ACL logs is terminated. with the seq, permit, or deny commands.
The threshold range is from 1 to 100.
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the traffic
that you want to monitor and the ACL in which you are creating the rule is applied
to the monitored interface.
NOTE: For more information, refer to the Flow-based Monitoring section in
the Port Monitoring chapter of the Dell Networking OS Configuration Guide.
Access Control Lists (ACL) 209