Version Description
8.2.1.0 Allows ACL control of fragmented packets for IP (Layer 3)
ACLs.
8.1.1.0 Introduced on the E-Series ExaScale.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
7.4.1.0 Added support for the noncontiguous mask and added the
monitor option.
6.5.1.0 Expanded to include the optional QoS order priority for the
ACL entry.
Usage
Information
The order option is relevant in the context of the Policy QoS feature only. For
more information, refer to the Quality of Service chapter of the
Dell Networking OS
Configuration Guide.
When you use the log option, the CP processor logs detail the packets that match.
Depending on how many packets match the log entry and at what rate, the CP
may become busy as it has to log these packets’ details.
The monitor option is relevant in the context of flow-based monitoring only. For
more information, refer to the Port Monitoring chapter.
The C-Series and S-Series cannot count both packets and bytes, when you enter
the count byte options, only bytes are incremented.
NOTE: When you configure ACL logging and byte counters simultaneously,
byte counters may display an incorrect value. Configure packet counters with
logging instead.
Related
Commands
deny tcp — assigns a filter to deny TCP packets.
deny udp — assigns a filter to deny UDP packets.
ip access-list extended — creates an extended ACL.
deny icmp
To drop all or specific internet control message protocol (ICMP) messages, configure a filter.
Syntax
deny icmp {source mask | any | host ip-address} {destination
mask | any | host ip-address} [dscp] [count [byte] [order]
[fragments] [no-drop]
To remove this filter, you have two choices:
• Use the no seq sequence-number command if you know the filter’s
sequence number.
Access Control Lists (ACL)
241