Users Guide

Version Description
8.3.10.0 Introduced on the S4810.
8.1.1.0 Introduced on the E-Series.
7.8.1.0 Increased the name string to accept up to 140 characters. Prior to 7.8.1.0, names were up
to 16 characters long.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
6.2.1.1 Introduced on the E-Series.
Example
Dell(conf)# ip access-list extended TESTListEXTEND
Dell(config-ext-nacl)#
Related Commands
ip access-list standardcongure a standard IP access list.
show cong — display the current conguration.
permit
To pass IP packets meeting the lter criteria, congure a lter.
Syntax
permit {source mask | any | host ip-address} {destination mask | any | host ip-
address} [count [bytes]] [dscp value] [order] [fragments] [no-drop]
To remove this lter, you have two choices:
Use the no seq sequence-number command if you know the lter’s sequence number.
Use the no deny {source mask | any | host ip-address} {destination mask | any |
host ip-address} command.
Parameters
source Enter the IP address in dotted decimal format of the network from which the packet was
sent.
mask (OPTIONAL) Enter a network mask in /prex format (/x) or A.B.C.D. The mask, when
specied in A.B.C.D format, may be either contiguous or non-contiguous.
any Enter the keyword any to specify that all routes are subject to the lter.
host ip-address Enter the keyword host then the IP address to specify a host IP address or hostname.
destination Enter the IP address of the network or host to which the packets are sent.
count (OPTIONAL) Enter the keyword count to count packets processed by the lter.
bytes (OPTIONAL) Enter the keyword bytes to count bytes processed by the lter.
dscp (OPTIONAL) Enter the keyword dcsp to match to the IP DCSCP values.
order (OPTIONAL) Enter the keyword order to specify the QoS priority for the ACL entry.
The range is from 0 to 254 (where 0 is the highest priority and 254 is the lowest; lower-
order numbers have a higher priority). If you do not use the keyword order, the ACLs
have the lowest order by default (255).
fragments Enter the keyword fragments to use ACLs to control packet fragments.
no-drop Enter the keywords no-drop to match only the forwarded packets.
194 Access Control Lists (ACL)