Dell Force10 S25-01-GE-24V FTOS 8.4.2.6 Command Line Reference Guide for the E - Page 217
order, monitor, count
View all Dell Force10 S25-01-GE-24V manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 217 highlights
source-mac-address mac-address-mask count byte log order monitor Enter a MAC address and mask in the nn:nn:nn:nn:nn format. For the MAC address mask, specify which bits in the MAC address must match. The MAC ACL supports an inverse mask, therefore, a mask of ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of 00:00:00:00:00:00 only allows entries that match exactly. (OPTIONAL) Enter the keyword count to count packets processed by the filter. (OPTIONAL) Enter the keyword byte to count bytes processed by the filter. (OPTIONAL, E-Series only) Enter the keyword log to have the information kept in an ACL log file. (OPTIONAL) Enter the keyword order to specify the QoS priority for the ACL entry. Range: 0-254 (where 0 is the highest priority and 254 is the lowest; lower order numbers have a higher priority) Default: If the order keyword is not used, the ACLs have the lowest order by default (255). (OPTIONAL) Enter the keyword monitor when the rule is describing the traffic that you want to monitor and the ACL in which you are creating the rule will be applied to the monitored interface. For details, see the section "Flow-based Monitoring" in the Port Monitoring chapter of the FTOS Configuration Guide. Defaults Not configured. Command Modes CONFIGURATION-EXTENDED-ACCESS-LIST Command History Version 8.2.1.0 Version 8.1.1.0 Version 7.4.1.0 Version 6.5.10 Allows ACL control of fragmented packets for IP (Layer 3) ACLs. Introduced on E-Series ExaScale Added monitor option Expanded to include the optional QoS order priority for the ACL entry. Usage The order option is relevant in the context of the Policy QoS feature only. See the "Quality of Information Service" chapter of the FTOS Configuration Guide for more information. When you use the log option, CP processor logs details about the packets that match. Depending on how many packets match the log entry and at what rate, the CP may become busy as it has to log these packets' details. The monitor option is relevant in the context of flow-based monitoring only. See Chapter 45, Port Monitoring. You cannot include IP, TCP or UDP (Layer 3) filters in an ACL configured with ARP or Ether-type (Layer 2) filters. Apply Layer 2 ACLs (ARP and Ether-type) to Layer 2 interfaces only. Note: When ACL logging and byte counters are configured simultaneously, byte counters may display an incorrect value. Configure packet counters with logging instead. Access Control Lists (ACL) | 217