Dell Force10 S55T FTOS Command Line Reference Guide for the S55 System FTOS 8. - Page 192
deny ether-type
View all Dell Force10 S55T manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 192 highlights
www.dell.com | support.dell.com Command History Version 8.2.1.0 Version 8.1.1.0 Version 7.4.1.0 Version 6.5.10 Allows ACL control of fragmented packets for IP (Layer 3) ACLs. Introduced on E-Series ExaScale Added monitor option Expanded to include the optional QoS order priority for the ACL entry. Usage The order option is relevant in the context of the Policy QoS feature only. See the "Quality of Service" Information chapter of the FTOS Configuration Guide for more information. The monitor option is relevant in the context of flow-based monitoring only. See Chapter 29, Port Monitoring. When you use the log option, CP processor logs details about the packets that match. Depending on how many packets match the log entry and at what rate, the CP may become busy as it has to log these packets' details. You cannot include IP, TCP or UDP (Layer 3) filters in an ACL configured with ARP or Ether-type (Layer 2) filters. Apply Layer 2 ACLs (ARP and Ether-type) to Layer 2 interfaces only. Note: When ACL logging and byte counters are configured simultaneously, byte counters may display an incorrect value. Configure packet counters with logging instead. deny ether-type e Configure an egress filter that drops specified types of Ethernet packets on egress ACL supported line cards (see your line card documentation). Syntax deny ether-type protocol-type-number {destination-mac-address mac-address-mask | any} vlan vlan-id {source-mac-address mac-address-mask | any} [count [byte] | log] [order] [monitor] To remove this filter, use one of the following: • Use the no seq sequence-number command syntax if you know the filter's sequence number or • Use the no deny ether-type protocol-type-number {destination-mac-address mac-address-mask | any} vlan vlan-id {source-mac-address mac-address-mask | any} command. Parameters protocol-type-number destination-mac-address mac-address-mask any vlan vlan-id Enter a number from 600 to FFFF as the specific Ethernet type traffic to drop. Enter a MAC address and mask in the nn:nn:nn:nn:nn format. For the MAC address mask, specify which bits in the MAC address must match. The MAC ACL supports an inverse mask, therefore, a mask of ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of 00:00:00:00:00:00 only allows entries that match exactly. Enter the keyword any to match and drop specific Ethernet traffic on the interface. Enter the keyword vlan followed by the VLAN ID to filter traffic associated with a specific VLAN. Range: 1 to 4094, 1-2094 for ExaScale (can used IDs 1-4094) To filter all VLAN traffic specify VLAN 1. 192 | Access Control Lists (ACL)