Dell Force10 S25N-S50N FTOS Command Line Reference Guide FTOS 8.4.2.7 E-Series - Page 220
order, count byte, monitor, fragments, Defaults, Command Modes, Command, History, Usage, Information
View all Dell Force10 S25N-S50N manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 220 highlights
www.dell.com | support.dell.com order monitor fragments (OPTIONAL) Enter the keyword order to specify the QoS priority for the ACL entry. Range: 0-254 (where 0 is the highest priority and 254 is the lowest; lower order numbers have a higher priority) Default: If the order keyword is not used, the ACLs have the lowest order by default (255). (OPTIONAL) Enter the keyword monitor when the rule is describing the traffic that you want to monitor and the ACL in which you are creating the rule will be applied to the monitored interface. For details, see the section "Flow-based Monitoring" in the Port Monitoring chapter of the FTOS Configuration Guide. Enter the keyword fragments to use ACLs to control packet fragments. Defaults Not configured. Command Modes CONFIGURATION-EXTENDED-ACCESS-LIST Command History Version 8.3.1.0 Version 8.2.1.0 Version 8.1.1.0 Version 7.6.1.0 Version 7.5.1.0 Version 7.4.1.0 Version 6.5.10 Add DSCP value for ACL matching. Allows ACL control of fragmented packets for IP (Layer 3) ACLs. Introduced on E-Series ExaScale Added support for S-Series Added support for C-Series Added support for non-contiguous mask and added the monitor option. Expanded to include the optional QoS order priority for the ACL entry. Usage The order option is relevant in the context of the Policy QoS feature only. See the "Quality of Information Service" chapter of the FTOS Configuration Guide for more information. When you use the log option, CP processor logs details about the packets that match. Depending on how many packets match the log entry and at what rate, the CP may become busy as it has to log these packets' details. The C-Series and S-Series cannot count both packets and bytes, so when you enter the count byte options, only bytes are incremented. The monitor option is relevant in the context of flow-based monitoring only. See the Chapter 44, Port Monitoring. Note: When ACL logging and byte counters are configured simultaneously, byte counters may display an incorrect value. Configure packet counters with logging instead. Related Commands deny tcp deny udp ip access-list extended Assign a filter to deny TCP packets. Assign a filter to deny UDP packets. Create an extended ACL. 220 | Access Control Lists (ACL)