Administrator Guide
ip Enter the keyword ip to configure a generic IP access list. The keyword ip specifies that
the access list permits all IP protocols.
tcp Enter the keyword tcp to configure a TCP access list filter.
udp Enter the keyword udp to configure a UDP access list filter.
source
Enter an IP address in dotted decimal format of the network from which the packet was
received.
mask
(OPTIONAL) Enter a network mask in /prefix format (/x) .
any Enter the keyword any to specify that all routes are subject to the filter.
host
ipv6-address
Enter the keyword host and then enter the IPv6 address to specify a host IP address or
hostname.
operator
(OPTIONAL) Enter one of the following logical operands:
• eq = equal to
• neq = not equal to
• gt = greater than
• lt = less than
• range = inclusive range of ports (you must specify two ports for the port
parameter.)
portnumber
(OPTIONAL) Enter the application layer port number. Enter two port numbers if you are
using the range logical operand. The range is from 0 to 65535.
The following list includes some common TCP port numbers:
• 23 = Telnet
• 20 and 21 = FTP-DATA and FTP
• 25 = SMTP
• 169 = SNMP
destination
Enter the IP address of the network or host to which the packets are sent.
count (OPTIONAL) Enter the keyword count to count the packets.
bytes (OPTIONAL) Enter the keyword bytes to count the bytes.
log (OPTIONAL) Enter the keyword log to enable the triggering of ACL log messages.
threshold-in msgs
count
(OPTIONAL) Enter the threshold-in-msgs keyword followed by a value to indicate
the maximum number of ACL logs that can be generated, exceeding which the generation
of ACL logs is terminate with the seq, permit, or deny commands. The threshold range
is from 1 to 100.
interval
minutes
(OPTIONAL) Enter the keyword interval followed by the time period in minutes at
which ACL logs must be generated. The interval range is from 1 to 10 minutes.
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing the traffic that you
want to monitor and the ACL in which you are creating the rule is applied to the
monitored interface.
Defaults
By default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is five minutes. By default, flow-based monitoring is not
enabled.
Command Modes ACCESS-LIST
Command History
This guide is platform-specific. For command information about other platforms, see the relevant Dell EMC
Networking OS Command Line Reference Guide.
Version Description
9.11(2.0P0) Included support for using logical names of a protocol to configure an IP access list in both
TCP and UDP on the S6000, S6000–ON, S6100–ON, Z9100–ON.
300 Access Control Lists (ACL)