Reference Guide
in which you are creating the rule is applied to the monitored
interface.
NOTE: For more information, refer to the “Flow-based
Monitoring” section in the Port Monitoring chapter of the
Dell Networking OS Configuration Guide.
Defaults Not configured
Command
Modes
CONFIGURATION-MAC ACCESS LIST-STANDARD
Command
History
Version 9.0(1.3) Introduced on the S5000.
Usage
Information
When you use the log option, the CP processor logs details about the packets that
match. Depending on how many packets match the log entry and at what rate, the
CP may become busy as it has to log these packets’ details.
NOTE: When ACL logging and byte counters are configured simultaneously,
byte counters may display an incorrect value. Configure packet counters with
logging instead.
Related
Commands
deny – configures a filter to drop packets.
permit – configures a filter to forward packets.
Extended MAC ACL Commands
When an access-list is created without any rule and then applied to an interface, ACL behavior reflects
implicit permit. The following commands configure Extended MAC ACLs.
The S5000 switch supports Ingress MAC ACLs only.
NOTE: For more information, also refer to the Commands Common to all ACL Types and Common
MAC Access List Commands sections.
deny
Configure a filter to drop packets that match the filter criteria.
S5000
Syntax
deny {any | host mac-address | mac-source-address mac-source-
address-mask} {any | host mac-address | mac-destination-address
mac-destination-address-mask} [ethertype-operator] [count
[byte]] [monitor]
To remove this filter, you have two choices:
Access Control Lists (ACL)
223










