Users Guide
Version Description
8.3.10.0 Introduced on the S4810.
8.1.1.0 Introduced on the E-Series.
7.8.1.0 Increased the name string to accept up to 140 characters. Prior to 7.8.1.0, names were up
to 16 characters long.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
6.2.1.1 Introduced on the E-Series.
Example
Dell(conf)# ip access-list extended TESTListEXTEND
Dell(config-ext-nacl)#
Related Commands
• ip access-list standard — congure a standard IP access list.
• show cong — display the current conguration.
permit
To pass IP packets meeting the lter criteria, congure a lter.
Syntax
permit {source mask | any | host ip-address} {destination mask | any | host ip-
address} [count [bytes]] [dscp value] [order] [fragments] [no-drop]
To remove this lter, you have two choices:
• Use the no seq sequence-number command if you know the lter’s sequence number.
•
Use the no deny {source mask | any | host ip-address} {destination mask | any |
host ip-address} command.
Parameters
source Enter the IP address in dotted decimal format of the network from which the packet was
sent.
mask (OPTIONAL) Enter a network mask in /prex format (/x) or A.B.C.D. The mask, when
specied in A.B.C.D format, may be either contiguous or non-contiguous.
any Enter the keyword any to specify that all routes are subject to the lter.
host ip-address Enter the keyword host then the IP address to specify a host IP address or hostname.
destination Enter the IP address of the network or host to which the packets are sent.
count (OPTIONAL) Enter the keyword count to count packets processed by the lter.
bytes (OPTIONAL) Enter the keyword bytes to count bytes processed by the lter.
dscp (OPTIONAL) Enter the keyword dcsp to match to the IP DCSCP values.
order (OPTIONAL) Enter the keyword order to specify the QoS priority for the ACL entry.
The range is from 0 to 254 (where 0 is the highest priority and 254 is the lowest; lower-
order numbers have a higher priority). If you do not use the keyword order, the ACLs
have the lowest order by default (255).
fragments Enter the keyword fragments to use ACLs to control packet fragments.
no-drop Enter the keywords no-drop to match only the forwarded packets.
194 Access Control Lists (ACL)










