Dell Force10 S25-01-GE-24V FTOS 8.4.2.6 Command Line Reference Guide for the E - Page 214
deny arp, order, count byte, monitor, opcode, count, fragments
View all Dell Force10 S25-01-GE-24V manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 214 highlights
www.dell.com | support.dell.com monitor fragments (OPTIONAL) Enter the keyword monitor when the rule is describing the traffic that you want to monitor and the ACL in which you are creating the rule will be applied to the monitored interface. For details, see the section "Flow-based Monitoring" in the Port Monitoring chapter of the FTOS Configuration Guide. Enter the keyword fragments to use ACLs to control packet fragments. Defaults Not configured. Command Modes CONFIGURATION-EXTENDED-ACCESS-LIST Command History Version 8.3.1.0 Version 8.2.1.0 Version 8.1.1.0 Version 7.6.1.0 Version 7.5.1.0 Version 7.4.1.0 Version 6.5.10 Add DSCP value for ACL matching. Allows ACL control of fragmented packets for IP (Layer 3) ACLs. Introduced on E-Series ExaScale Added support for S-Series Added support for C-Series Added support for non-contiguous mask and added the monitor option. Expanded to include the optional QoS order priority for the ACL entry. Usage The order option is relevant in the context of the Policy QoS feature only. See the "Quality of Information Service" chapter of the FTOS Configuration Guide for more information. When you use the log option, CP processor logs details about the packets that match. Depending on how many packets match the log entry and at what rate, the CP may become busy as it has to log these packets' details. The C-Series and S-Series cannot count both packets and bytes, so when you enter the count byte options, only bytes are incremented. The monitor option is relevant in the context of flow-based monitoring only. See the Chapter 45, Port Monitoring. Note: When ACL logging and byte counters are configured simultaneously, byte counters may display an incorrect value. Configure packet counters with logging instead. Related Commands deny tcp deny udp ip access-list extended Assign a filter to deny TCP packets. Assign a filter to deny UDP packets. Create an extended ACL. deny arp e Syntax Configure an egress filter that drops ARP packets on egress ACL supported line cards (see your line card documentation). deny arp {destination-mac-address mac-address-mask | any} vlan vlan-id {ip-address | any | opcode code-number} [count [byte] | log] [order] [monitor] 214 | Access Control Lists (ACL)