Reference Guide
monitor (OPTIONAL) Enter the keyword monitor when the rule is describing
the traffic that you want to monitor and the ACL in which you are
creating the rule is applied to the monitored interface.
NOTE: For more information, refer to the “Flow-based Monitoring”
section in the Port Monitoring chapter of the
FTOS Configuration
Guide
.
Defaults Not configured
Command Modes CONFIGURATION-MAC ACCESS LIST-STANDARD
Command History
Version 8.3.11.1 Introduced on the Z9000.
Version 8.1.1.0 Introduced on the E-Series ExaScale.
Version 7.6.1.0 Introduced on the S-Series.
Version 7.5.1.0 Introduced on the C-Series.
Version 7.4.1.0 Added the monitor option.
pre-Version
6.1.1.0
Introduced on the E-Series.
Usage
Information
When you use the log option, the CP processor logs details about the packets that match.
Depending on how many packets match the log entry and at what rate, the CP may become
busy as it has to log these packets’ details.
NOTE: When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
Related
Commands
deny – configures a filter to drop packets.
permit – configures a filter to forward packets.
Extended MAC ACL Commands
When an access-list is created without any rule and then applied to an interface, ACL behavior reflects implicit permit.
The following commands configure Extended MAC ACLs.
The C-Series and S-Series platforms support Ingress MAC ACLs only.
The S4810 and Z9000 support both Ingress and Egress MAC ACLs.
NOTE: For more information, also refer to the Commands Common to all ACL Types and Common MAC Access List
Commands sections.
296










