Reference Guide

Command
Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
Command
History
Version 9.0(1.3) Introduced on the S5000.
Usage
Information
The order option is relevant in the context of the Policy QoS feature only. For
more information, refer to the “Quality of Service” chapter of the
Dell Networking
OS Configuration Guide.
When you use the log option, the CP processor logs details about the packets that
match. Depending on how many packets match the log entry and at what rate, the
CP may become busy as it has to log these packets’ details.
The monitor option is relevant in the context of flow-based monitoring only. For
more information, refer to
Port Monitoring.
The S5000 cannot count both packets and bytes; when you enter the count byte
options, only bytes are incremented.
NOTE: When ACL logging and byte counters are configured simultaneously,
byte counters may display an incorrect value. Configure packet counters with
logging instead.
Related
Commands
ip access-list extended – creates an extended ACL.
permit tcp – assigns a permit filter for TCP packets.
permit udp – assigns a permit filter for UDP packets.
permit tcp
Configure a filter to pass TCP packets meeting the filter criteria.
S5000
Syntax
permit tcp {source mask | any | host ip-address} [bit]
[operator port [port]] {destination mask | any | host ip-
address} [bit] [dscp] [operator port [port]] [count [byte]]
[order] [monitor] [fragments]
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filter’s
sequence number.
Use the no permit tcp {source mask | any | host ip-address}
{destination mask | any | host ip-address} command.
Parameters
source Enter the IP address of the network or host from which the
packets were sent.
206
Access Control Lists (ACL)