Administrator Guide

Version Description
8.2.1.0 Allows ACL control of fragmented packets for IP (Layer 3) ACLs.
8.1.1.0 Introduced on the E-Series.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
7.4.1.0 Added support for the non-contiguous mask and added the monitor option.
6.5.10 Expanded to include the optional QoS order priority for the ACL entry.
Usage Information
The order option is relevant in the context of the Policy QoS feature only. For more information, see the “Quality
of Service” section of the Dell EMC Networking OS Configuration Guide.
The software cannot count both packets and bytes; when you enter the count byte options, only bytes are
incremented.
Related
Commands
ip access-list extended — create an extended ACL.
permit tcp — assign a permit filter for TCP packets.
permit udp — assign a permit filter for UDP packets.
permit tcp
To pass TCP packets meeting the filter criteria, configure a filter.
Syntax
permit tcp {source mask | any | host ip-address} [bit] [operator port [port]]
{destination mask | any | host ip-address} [bit] [ttl operator] [dscp]
[operator port [port]] [count [byte] [order] [fragments] [monitor] [no-drop]
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filter’s sequence number.
Use the no permit tcp {source mask | any | host ip-address} {destination mask |
any | host ip-address} command.
Parameters
source
Enter the IP address of the network or host from which the packets were sent.
mask
Enter a network mask in /prefix format (/x) or A.B.C.D. The mask, when specified in
A.B.C.D format, may be either contiguous or non-contiguous.
any Enter the keyword any to specify that all routes are subject to the filter.
host
ip-address
Enter the keyword host then the IP address to specify a host IP address.
bit
Enter a flag or combination of bits:
ack: acknowledgement field
fin: finish (no more data from the user)
psh: push function
rst: reset the connection
syn: synchronize sequence numbers
urg: urgent field
established: datagram of established TCP session
Use the established flag to match only ACK and RST flags of established TCP
session.
You cannot use established along with the other control flags
While using the established flag in an ACL rule, all the other TCP control flags are
masked, to avoid redundant TCP control flags configuration in a single rule. When you use
any TCP control flag in an ACL rule,
established is masked and other control flags are
available.
Access Control Lists (ACL) 197