Reference Guide
monitor (OPTIONAL) Enter the keyword monitor when the rule is
describing the traffic that you want to monitor and the ACL
in which you are creating the rule is applied to the monitored
interface. For more information, refer to the “Flow-based
Monitoring” section in the Port Monitoring chapter of the
Dell Networking OS Configuration Guide.
fragments Enter the keyword fragments to use ACLs to control packet
fragments.
Defaults Not configured.
Command
Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
Command
History
Version 9.0(1.3) Introduced on the S5000.
Usage
Information
The order option is relevant in the context of the Policy QoS feature only. For
more information, refer to the Quality of Service chapter of the
Dell Networking OS
Configuration Guide.
When you use the log option, the CP processor logs detail the packets that match.
Depending on how many packets match the log entry and at what rate, the CP
may become busy as it has to log these packets’ details.
The monitor option is relevant in the context of flow-based monitoring only. For
more information, refer to the
Port Monitoring chapter.
The S5000 cannot count both packets and bytes, when you enter the count byte
options, only bytes are incremented.
NOTE: When ACL logging and byte counters are configured simultaneously,
byte counters may display an incorrect value. Configure packet counters with
logging instead.
Related
Commands
deny tcp – assigns a filter to deny TCP packets.
deny udp – assigns a filter to deny UDP packets.
ip access-list extended – creates an extended ACL.
deny tcp
Configure a filter that drops transmission control protocol (TCP) packets meeting the filter criteria.
S5000
Syntax
deny tcp {source mask | any | host ip-address} [bit] [operator
port [port]] {destination mask | any | host ip-address} [dscp]
[bit] [operator port [port]] [count [byte]] [order] [monitor]
[fragments]
To remove this filter, you have two choices:
198
Access Control Lists (ACL)










