CLI Guide

Version Description
9.7(0.0) Introduced on the S6000–ON.
9.2(1.0) Introduced on the Z9500.
9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
8.1.1.0 Introduced on the E-Series.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
6.1.1.0 Introduced on the E-Series.
Usage Information
When you use the log option, the CP processor logs details about the packets that
match. Depending on how many packets match the log entry and at what rate, the
CP may become busy as it has to log these packets’ details.
NOTE: When you configure the ACL logging and byte counters
simultaneously, byte counters may display an incorrect value. Configure
packet counters with logging inst”ad.
Related
Commands
deny — configure a MAC ACL filter to drop packets.
seq — configure a MAC ACL filter with a specified sequence number.
seq
To a deny or permit filter in a MAC access list while creating the filter, assign a sequence number.
Syntax
deny {any | mac-source-address [mac-source-address-mask]}
[count [byte]] [log [interval minutes] [threshold-in-msgs
[count]] [monitor]
To remove this filter, you have two choices:
Use the no seq sequence-number command if you know the filter’s
sequence number.
Use the no deny {any | mac-source-address mac-source-address-
mask} command.
Parameters
any Enter the keyword any to specify that all routes are subject
to the filter.
mac-source-
address
Enter a MAC address in nn:nn:nn:nn:nn:nn format.
Access Control Lists (ACL)
241