Users Guide

Version Description
9.8(0.0P5) Introduced on the S4048-ON.
9.8(0.0P2) Introduced on the S3048-ON.
9.8(0.0) Added the no-drop parameter.
9.7(0.0) Introduced on the S6000–ON.
9.2(1.0) Introduced on the Z9500.
9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
8.3.1.0 Add the DSCP value for ACL matching.
8.2.1.0 Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
8.1.1.0 Introduced on the E-Series.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
7.4.1.0 Added support for the noncontiguous mask and added the monitor option.
6.5.1.0 Expanded to include the optional QoS order priority for the ACL entry.
Usage Information
The order option is relevant in the context of the Policy QoS feature only. For more information, see the
Quality of Service section in the Dell Networking OS Conguration Guide.
When you use the log option, the CP processor logs detail the packets that match. Depending on how
many packets match the log entry and at what rate, the CP may become busy as it has to log these packets
details.
The monitor option is relevant in the context of ow-based monitoring only. For more information, see
Port Monitoring.
The C-Series and S-Series cannot count both packets and bytes, when you enter the count byte options,
only bytes are incremented.
NOTE: When you congure ACL logging and byte counters simultaneously, byte counters may
display an incorrect value. Congure packet counters with logging instead.
Related Commands
deny tcp — assign a lter to deny TCP packets.
deny udp — assign a lter to deny UDP packets.
ip access-list extended — create an extended ACL.
deny icmp
To drop all or specic internet control message protocol (ICMP) messages, congure a lter.
Syntax
deny icmp {source mask | any | host ip-address} {destination mask | any |
host ip-address} [dscp] [count [byte] [order] [fragments] [no-drop]
218
Access Control Lists (ACL)