Users Guide
CONFIGURATION mode
ip control-plane [egress filter]
2. Apply Egress ACLs to IPv6 system trac.
CONFIGURATION mode
ipv6 control-plane [egress filter]
3. Create a Layer 3 ACL using permit rules with the count option to describe the desired CPU trac.
CONFIG-NACL mode
permit ip {source mask | any | host ip-address} {destination mask | any | host ip-
address} count
Dell Networking OS Behavior: Virtual router redundancy protocol (VRRP) hellos and internet group management protocol (IGMP)
packets are not aected when you enable egress ACL ltering for CPU trac. Packets the CPU sends with the source address as
the VRRP virtual IP address have the interface MAC address instead of VRRP virtual MAC address.
Congure ACLs to Loopback
You can apply ACLs on a Loopback interface.
Conguring ACLs onto the CPU in a Loopback interface protects the system infrastructure from attack — malicious and incidental
— by explicate allowing only authorized trac.
The ACLs on Loopback interfaces are applied only to the CPU on the stack–unit — this application eliminates the need to apply
specic ACLs onto all ingress interfaces and achieves the same results. By localizing target trac, it is a simpler implementation.
The ACLs target and handle Layer 3 trac destined to terminate on the system including routing protocols, remote access, simple
network management protocol (SNMP), internet control message protocol (ICMP), and so on, Eective ltering of Layer 3 trac
from Layer 3 routers reduces the risk of attack.
NOTE: Loopback ACLs are supported only on ingress trac.
Loopback interfaces do not support ACLs using the IP fragment option. If you congure an ACL with the fragments option
and apply it to a Loopback interface, the command is accepted, but the ACL entries are not installed the oending rule in CAM.
For more information, refer to the Loopback Interfaces section in the Interfaces chapter.
Applying an ACL on Loopback Interfaces
You can apply ACLs on a Loopback interface.
To apply an ACL (standard or extended) for Loopback, following these commands:
1. Only loopback 0 is supported for the Loopback ACL.
CONFIGURATION mode
interface loopback 0
2. Apply rules to the new ACL.
CONFIGURATION mode
ip access-list [standard | extended] name
3. Apply an ACL to trac entering loopback. The keyword in congures the ACL to lter incoming trac.
INTERFACE mode
ip access-group name in
Access Control Lists (ACLs)
127










