Dell Force10 S60-44T FTOS Command Line Reference Guide for the S60 System FTOS - Page 191
range, count, order, monitor, fragments, Defaults, Command Modes - user guide
View all Dell Force10 S60-44T manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 191 highlights
dscp bit operator port port destination mask count byte log order monitor fragments Enter this keyword to deny a packet based on DSCP value. Range: 0-63 Enter a flag or combination of bits: ack: acknowledgement field fin: finish (no more data from the user) psh: push function rst: reset the connection syn: synchronize sequence numbers urg: urgent field (OPTIONAL) Enter one of the following logical operand: • eq = equal to • neq = not equal to • gt = greater than • lt = less than • range = inclusive range of ports (you must specify two ports for the port command parameter. Enter the application layer port number. Enter two port numbers if using the range logical operand. Range: 0 to 65535. The following list includes some common TCP port numbers: • 23 = Telnet • 20 and 21 = FTP • 25 = SMTP • 169 = SNMP Enter the IP address of the network or host to which the packets are sent. Enter a network mask in /prefix format (/x) or A.B.C.D. The mask, when specified in A.B.C.D format, may be either contiguous or non-contiguous. (OPTIONAL) Enter the keyword count to count packets processed by the filter. (OPTIONAL) Enter the keyword byte to count bytes processed by the filter. (OPTIONAL, E-Series only) Enter the keyword log to enter ACL matches in the log. Supported on Jumbo-enabled line cards only. (OPTIONAL) Enter the keyword order to specify the QoS priority for the ACL entry. Range: 0-254 (where 0 is the highest priority and 254 is the lowest; lower order numbers have a higher priority) Default: If the order keyword is not used, the ACLs have the lowest order by default (255). (OPTIONAL) Enter the keyword monitor when the rule is describing the traffic that you want to monitor and the ACL in which you are creating the rule will be applied to the monitored interface. For details, see the section "Flow-based Monitoring" in the Port Monitoring chapter of the FTOS Configuration Guide. Enter the keyword fragments to use ACLs to control packet fragments. Defaults Not configured. Command Modes CONFIGURATION-EXTENDED-ACCESS-LIST Access Control Lists (ACL) | 191