Dell Force10 S4820T FTOS Command Reference Guide - Page 207
deny ether-type, or Ether-type Layer 2 filters. Apply Layer 2 ACLs ARP and Ether-type to Layer 2
View all Dell Force10 S4820T manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 207 highlights
Defaults Command Modes Command History Usage Information order monitor (OPTIONAL) Enter the keyword order to specify the QoS priority for the ACL entry. Range: 0-254 (where 0 is the highest priority and 254 is the lowest; lower order numbers have a higher priority) Default: If the order keyword is not used, the ACLs have the lowest order by default (255). (OPTIONAL) Enter the keyword monitor when the rule is describing the traffic that you want to monitor and the ACL in which you are creating the rule will be applied to the monitored interface. For details, refer to the section "Flow-based Monitoring" in the Port Monitoring chapter of the FTOS Configuration Guide. Not configured. CONFIGURATION-EXTENDED-ACCESS-LIST Version 8.2.1.0 Version 8.1.1.0 Version 7.4.1.0 Version 6.5.10 Allows ACL control of fragmented packets for IP (Layer 3) ACLs. Introduced on E-Series ExaScale Added monitor option Expanded to include the optional QoS order priority for the ACL entry. The order option is relevant in the context of the Policy QoS feature only. Refer to the "Quality of Service" chapter of the FTOS Configuration Guide for more information. The monitor option is relevant in the context of flow-based monitoring only. Refer to the Port Monitoring chapter. When you use the log option, CP processor logs details about the packets that match. Depending on how many packets match the log entry and at what rate, the CP may become busy as it has to log these packets' details. You cannot include IP, TCP or UDP (Layer 3) filters in an ACL configured with ARP or Ether-type (Layer 2) filters. Apply Layer 2 ACLs (ARP and Ether-type) to Layer 2 interfaces only. Note: When ACL logging and byte counters are configured simultaneously, byte counters may display an incorrect value. Configure packet counters with logging instead. deny ether-type e Configure an egress filter that drops specified types of Ethernet packets on egress ACL supported line cards (refer to your line card documentation). Syntax deny ether-type protocol-type-number {destination-mac-address mac-address-mask | any} vlan vlan-id {source-mac-address mac-address-mask | any} [count [byte] | log] [order] [monitor] Access Control Lists (ACL) | 207