Defaults

Command Modes

Command History

Usage Information

Related Commands

byte

(OPTIONAL) Enter the keyword byte to count bytes

 

processed by the filter.

log

(OPTIONAL, E-Series only) Enter the keyword log to log the

 

packets.

monitor

(OPTIONAL) Enter the keyword monitor when the rule is

 

describing the traffic that you want to monitor and the ACL

 

in which you are creating the rule is applied to the monitored

 

interface.

 

NOTE: For more information, refer to the Flow-based

 

Monitoring section in the Port Monitoring chapter of the

 

Dell Networking OS Configuration Guide.

Not configured.

CONFIGURATION-MAC ACCESS LIST-STANDARD

This guide is platform-specific. For command information about other platforms, refer to the relevant Dell Networking OS Command Line Reference Guide.

The following is a list of the Dell Networking OS version history for this command.

VersionDescription

9.7(0.0)

Introduced on the S6000–ON.

9.0.2.0Introduced on the S6000.

8.3.19.0Introduced on the S4820T.

8.3.11.1Introduced on the Z9000.

8.3.7.0Introduced on the S4810.

8.1.1.0Introduced on the E-Series ExaScale.

7.6.1.0Introduced on the S-Series.

7.5.1.0Introduced on the C-Series.

6.1.1.0Introduced on the E-Series.

When you use the log option, the CP processor logs details about the packets that match. Depending on how many packets match the log entry and at what rate, the CP may become busy as it has to log these packets’ details.

NOTE: When you configure the ACL logging and byte counters simultaneously, byte counters may display an incorrect value. Configure packet counters with logging instead.

deny — configures a MAC ACL filter to drop packets.

Access Control Lists (ACL)

229

Page 229
Image 229
Dell 9.7(0.0) manual 229