Dell 9.8(0.0) Switch User Manual


  Open as PDF
of 1905
 
mac-
destination-
address-mask
Specify which bits in the MAC address must be matched.
The MAC ACL supports an inverse mask; therefore, a mask of
ff:ff:ff:ff:ff:ff allows entries that do not match and a mask of
00:00:00:00:00:00 only allows entries that match exactly.
ethertype
operator
(OPTIONAL) To filter based on protocol type, enter one of
the following Ethertypes:
ev2 - is the Ethernet II frame format
llc - is the IEEE 802.3 frame format
snap - is the IEEE 802.3 SNAP frame format
count (OPTIONAL) Enter the keyword count to count packets the
filter processes.
byte (OPTIONAL) Enter the keyword byte to count bytes the filter
processes.
log (OPTIONAL) Enter the keyword log to include ACL
messages in the log.
threshold-in
msgs count
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated with the
seq, permit, or deny
commands. The threshold range is from 1 to 100.
interval
minutes
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
The threshold range is from 1 to 10 minutes.
monitor (OPTIONAL) Enter the keyword monitor when the rule is
describing the traffic that you want to monitor and the ACL
in which you are creating the rule is applied to the monitored
interface. For more information, refer to the “Flow-based
Monitoring” section in the Port Monitoring chapter of the
Dell Networking OS Configuration Guide.
Defaults Not configured.
Command
Modes
CONFIGURATION-MAC ACCESS LIST-EXTENDED
Command
History
This guide is platform-specific. For command information about other platforms,
refer to the relevant Dell Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version Description
9.2(1.0) Introduced on the Z9500.
Access Control Lists (ACL)
291