Setup Guide

Table Of Contents
Version Description
7.8.1.0 Increased the name string to accept up to 140 characters. Prior to 7.8.1.0, names
are up to 16 characters long.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series
6.1.1.0 Introduced on the E-Series.
Usage
Information
The ACL hit counters increment the counters for each matching rule, not just the first matching rule.
Example
DellEMC#show mac accounting access-list
Ingress Extended mac access-list acl1 on hundredGigE 1/1
Total cam count 1
seq 5 permit host 00:00:00:00:00:aa host 00:00:00:00:00:bb
Egress Extended mac access-list acl1 on hundredGigE 1/32
Total cam count 1
seq 5 permit host 00:00:00:00:00:aa host 00:00:00:00:00:bb
DellEMC#
Standard MAC ACL Commands
When you create an access control list without any rule and then apply it to an interface, the ACL behavior reflects implicit
permit. These commands configure standard MAC ACLs and support both Ingress and Egress MAC ACLs.
NOTE:
For more information, also refer to the Commands Common to all ACL Types and Common MAC Access List
Commands sections.
deny
To drop packets with a the MAC address specified, configure a filter.
Syntax
deny {any | mac-source-address [mac-source-address-mask]} [count [byte]]
[log] [monitor]
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filters sequence number.
Use the no deny {any | mac-source-address mac-source-address-mask} command.
Parameters
any Enter the keyword any to specify that all routes are subject to the filter.
mac-source-
address
Enter a MAC address in nn:nn:nn:nn:nn:nn format.
mac-source-
address-mask
(OPTIONAL) Specify which bits in the MAC address must match. If no mask is
specified, a mask of 00:00:00:00:00:00 is applied (in other words, the filter allows
only MAC addresses that match).
count (OPTIONAL) Enter the keyword count to count packets processed by the filter.
byte (OPTIONAL) Enter the keyword byte to count bytes processed by the filter.
log (OPTIONAL, E-Series only) Enter the keyword log to log the packets.
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the traffic
that you want to monitor and the ACL in which you are creating the rule is applied
to the monitored interface. For more information, see the Flow-based Monitoring
in the Port Monitoring section in the Dell EMC Networking OS Configuration Guide.
Defaults Not enabled.
230 Access Control Lists (ACL)