Reference Guide

destination Enter the IP address of the network or host to which the
packets are sent.
mask Enter a network mask in /prefix format (/x) or A.B.C.D. The
mask, when specified in A.B.C.D format, may be either
contiguous or non-contiguous.
count (OPTIONAL) Enter the keyword count to count packets
processed by the filter.
byte (OPTIONAL) Enter the keyword byte to count bytes
processed by the filter.
order (OPTIONAL) Enter the keyword order to specify the QoS
priority for the ACL entry. The range is from 0 to 254 (where
0 is the highest priority and 254 is the lowest; lower order
numbers have a higher priority) If you did not use the
keyword order, the ACLs have the lowest order by default
(255).
monitor (OPTIONAL) Enter the keyword monitor when the rule is
describing the traffic that you want to monitor and the ACL
in which you are creating the rule is applied to the monitored
interface. For more information, refer to the “Flow-based
Monitoring” section in the Port Monitoring chapter of the
Dell Networking OS Configuration Guide.
fragments Enter the keyword fragments to use ACLs to control packet
fragments.
Defaults Not configured.
Command
Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
Command
History
Version 9.0(1.3) Introduced on the S5000.
Usage
Information
The order option is relevant in the context of the Policy QoS feature only. For
more information, refer to the Quality of Service chapter of the Dell Networking OS
Configuration Guide.
The monitor option is relevant in the context of flow-based monitoring only. For
more information, refer to the
Port Monitoring chapter.
When you use the log option, the CP processor logs details the packets that
match. Depending on how many packets match the log entry and at what rate, the
CP may become busy as it has to log these packets’ details.
The S5000 cannot count both packets and bytes; when you enter the count byte
options, only bytes are incremented.
NOTE: When ACL logging and byte counters are configured simultaneously,
byte counters may display an incorrect value. Configure packet counters with
logging instead.
Most ACL rules require one entry in the CAM. However, rules with TCP and UDP
port operators (for example, gt, lt, or range) may require more than one entry. The
200
Access Control Lists (ACL)