Reference Guide

fragments Enter the keyword fragments to use ACLs to control packet
fragments.
Defaults Not configured
Command
Modes
CONFIGURATION-STANDARD-ACCESS-LIST
Command
History
Version 9.0(1.3) Introduced on the S5000.
Usage
Information
The monitor option is relevant in the context of flow-based monitoring only. For
more information, refer to Port Monitoring.
The order option is relevant in the context of the Policy QoS feature only. The
following applies:
The seq sequence-number command is applicable only in an ACL group.
The order option works across ACL groups that have been applied on an
interface via the QoS policy framework.
The order option takes precedence over seq sequence-number.
If sequence-number is not configured, the rules with the same order value are
ordered according to their configuration order.
If sequence-number is configured, the sequence-number is used as a tie
breaker for rules with the same order.
When you use the log option, the CP processor logs details about the packets that
match. Depending on how many packets match the log entry and at what rate, the
CP may become busy as it has to log these packets’ details.
NOTE: When ACL logging and byte counters are configured simultaneously,
byte counters may display an incorrect value. Configure packet counters with
logging instead.
Related
Commands
deny – configures a filter to drop packets.
permit – configures a filter to forward packets.
Extended IP ACL Commands
When an ACL is created without any rule and then applied to an interface, ACL behavior reflects an
implicit permit.
The following commands configure extended IP ACLs, which in addition to the IP address, also examine
the packet’s protocol type.
NOTE: Also refer to the Commands Common to all ACL Types and Common IP ACL Commands
sections.
196
Access Control Lists (ACL)