Trademarks used in this text: Dell™, the Dell logo, Dell Boomi™, Dell Precision™ , OptiPlex™, Latitude™, PowerEdge™,
PowerVault™, PowerConnect™, OpenManage™, EqualLogic™, Compellent™, KACE™, FlexAddress™, Force10™, Venue
and Vostro™ are trademarks of Dell Inc. Intel®, Pentium®, Xeon®, Core® and Celeron® are registered trademarks of
Intel Corporation in the U.S. and other countries. AMD® is a registered trademark and AMD Opteron™, AMD Phenom
and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft®, Windows®, Windows Server®,
Internet Explorer®, MS-DOS®, Windows Vista® and Active Directory® are either trademarks or registered trademarks of
Microsoft Corporation in the United States and/or other countries. Red Hat® and Red Hat® Enterprise Linux® are
registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell® and SUSE® are registered
trademarks of Novell Inc. in the United States and other countries. Oracle® is a registered trademark of Oracle
Corporation and/or its affiliates. Citrix®, Xen®, XenServer® and XenMotion® are either registered trademarks or
trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware®, vMotion®, vCenter®,
vCenter SRM™ and vSphere® are registered trademarks or trademarks of VMware, Inc. in the United States or other
countries. IBM® is a registered trademark of International Business Machines Corporation.
2014 - 02
Rev. A00
™
™
Page 3
Contents
1 About this Document.............................................................................................23
show interfaces status Command Example.............................................................................. 596
show fcoe-map Command Examples ...................................................................................... 597
show qos dcb-map Command Examples ................................................................................ 598
show npiv devices brief Command Example............................................................................ 598
show npiv devices Command Example ....................................................................................599
show fc switch Command Example .........................................................................................600
Page 22
22
Page 23
1
About this Document
This document describes the new functionalities and enhancements in the Dell Networking OS Release
version 9.3.0.0. All of the behavioral-changes and new features are covered in this single, consolidated
Addendum. Use this document in conjunction with the hardware and software manuals of Release
9.2.0.0, which contains comprehensive information on the working and usage of the different platforms
and their associated functionalities. You can obtain a copy of the latest documents of Release 9.2.0.0
from the technical documentation website at http://www.dell.com/manuals
We are not publishing the entire documentation set for Release version 9.3.0.0. Instead, this document
presents the new and changed hardware and software processes for this release. It supplements the
Release version 9.2.0.0 set of documents and allows you to locate information in an easy, streamlined
way.
For topics that highlight the syntax and usage of commands, only the parameters that have been
introduced or modified from the previous release are included in this document. However, the newly
introduced commands, are however, covered in depth. For a complete description of all commands that
have been enhanced or modified in Release 9.3.0.0 and were present in Release 9.2.0.0, refer the
respective Command Line Reference Guide of the applicable platform.
For topics that provide a conceptual overview of new functionalities, and configuration procedures, only
the enhancements and changes that have been implemented in Release 9.3.0.0 are mentioned in this
Addendum. For complete information about such features that have been only enhanced and are not
newly introduced in this release, refer the respective Configuration Guide of the applicable platform of
Release 9.2.0.0.
NOTE: Although information that describes functionalites on the S4810 and S4820T platforms is
included in this document, Dell Networking OS Release 9.3(0.0) is not supported on the S4810 and
S4820T platforms.
Audience
This document is intended for system administrators who are responsible for configuring and maintaining
networks and assumes knowledge in Layer 2 and Layer 3 networking technologies.
Conventions
This guide uses the following conventions to describe command syntax.
Keyword
parameterParameters are in italics and require a number or word to be entered in the CLI.
{X}Keywords and parameters within braces must be entered in the CLI.
[X]Keywords and parameters within brackets are optional.
x|yKeywords and parameters separated by a bar require you to choose one option.
About this Document
Keywords are in Courier (a monospaced font) and must be entered in the CLI as
listed.
23
Page 24
x||yKeywords and parameters separated by a double bar allows you to choose any or
all of the options.
Related Documents
For more information about the Dell Networking S4810, S4820T, S6000, Z9000, MXL 10/40GbE Switch,
and the I/O Aggregator systems, refer the following documents corresponding to each of the platforms:
•FTOS Command Reference
•Installing the System
•Dell Quick Start Guide
•FTOS Release Notes
24
About this Document
Page 25
2
802.1X on the MXL 10/40GbE Switch
In Dell Networking OS Release 9.3(0.0), the MXL 10/40GbE Switch supports 802.1X port authentication.
802.1X is a method of port security. A device connected to a port that is enabled with 802.1X is
disallowed from sending or receiving packets on the network until its identity can be verified (through a
username and password, for example). For details on the command syntaxes and the keywords, refer the
802.1X chapter of the MXL Command Reference Guide of Release 9.2(0.2). For details on the conceptual
overview and step-wise procedures to enable and configure 802.1X settings, refer the 802.1X chapter of
the MXL Configuration Guide of Release 9.2(0.2).
802.1X on the MXL 10/40GbE Switch
25
Page 26
26
Page 27
3
ACL VLAN Groups and Content
Addressable Memory (CAM)
This chapter describes the ACL VLAN group and CAM enhancements, and contains the following
sections:
•Optimizing CAM Utilization During the Attachment of ACLs to VLANs
•Allocating FP Blocks for VLAN Processes
Optimizing CAM Utilization During the Attachment of
ACLs to VLANs
This functionality is supported on the S4810, S4820T, Z9000, I/O Aggregator and MXL platforms.
You can enable and configure the access control list (ACL) content addressable memory (CAM)
optimization functionality to minimize the number of entries in CAM while ACLs are applied on a VLAN or
a set of VLANs and also while ACLS are applied on a set of ports. This capability enables effective usage of
CAM space when Layer 3 ACLs are applied to a set of VLANs and when Layer 2 or Layer 3 ACLs are
applied on a set of ports.
In releases of Dell Networking OS that does not support the CAM optimization functionality to reduce the
usage of CAM area for application of ACLs, when an ACL is applied on a VLAN, the rules of the ACL are
configured in the ACL region with the rule-specific parameters along with the Vlan as additional
attributes. Therefore, when the ACL is applied on multiple VLAN interfaces, the consumption of CAM area
increases proportionally. For example, when an ACL with ‘n’ number of rules is applied on ‘m’ number of
VLAN interfaces, totally (n*m) entries are configured in the CAM region that is allocated for ACLs.
Similarly, when an L2 or L3 ACL is applied on a set of ports, the same problem with large usage of CAM
area occurs because a port is used as a parameter to be saved in CAM.
To avoid this problem of excessive consumption of CAM area, you can configure ACL VLAN groups that
combines all the VLANs that are applied with the same ACL in a single group. A class identifier (Class ID)
for each of ACL attached to the VLAN is assigned and this Class ID is used as an identifier or locator in the
CAM area instead of the VLAN id. This method of processing signficiantly reduces the number of entries
in the CAM area and saves memory space by using the class ID as filtering criterion in CAM instead of the
VLAN ID.
You can create an ACL VLAN group and attach the ACL with the VLAN members. The optimization is
applicable only when you create an ACL VLAN group. If you apply an ACL separately on the VLAN
interface, each ACL has a mapping with the VLAN and increased CAM space utilization occurs. Attaching
an ACL individually to VLAN interfaces is similar to the behavior of ACL-VLAN mapping storage in CAM
prior to the implementation of the ACL VLAN group functionality.
The ACL manager application on router processor (RP1) contains all the state information about all the
Acl Vlan groups that are present. The ACL handler on control processor (CP) and the ACL agent on line
cards do not contain any stateful information about the group. The ACL manager application performs all
the validation after you enter an acl-vlan-group command. If the command is valid, it is processed
and sent to the agent if required. If a configuration error is found or if the maximum limit is exceeded for
ACL VLAN Groups and Content Addressable Memory (CAM)
27
Page 28
the ACL VLAN groups present on the system, an appropriate error message is displayed. The ACL
manager application processes the following parameters when you enter an acl-vlan-group
command:
•Whether the CAM profile is set in VFP
•Whether the maximum number of groups in the system is exceeded
•Whether the maximum number of VLAN numbers permitted per ACL group is exceeded
•When a VLAN member that is being added is already a part of another ACL group
After these verification steps are performed, the ACL manager considers the command as valid and sends
the information to the ACL agent on the line card as applicable. The ACL manager notifies the ACL agent
in the following cases:
•A VLAN member is added or removed from a group and previously associated VLANs exist in the
group
•Egress ACL is applied or removed from the group and the group contains VLAN members VLAN
members are added or deleted from a vlan, which itself is a group member.
•A line card returns to the active state after going down and this line card contains a VLAN that is a
member of an ACL group
•The ACL VLAN group is deleted and it contains VLAN members
The ACL manager does not notify the ACL agent in the following cases:
•The ACL VLAN group is created.
•The ACL VLAN group is deleted and it does not contain any VLAN members.
•The ACL is applied or removed from a group, and the ACL group does not contain a VLAN member.
•The description of the ACL group is added or removed.
Guidelines for Configuring ACL VLAN groups
This functionality is supported on the S4810, S4820T, Z9000, I/O Aggregator and MXL platforms.
Keep the following points in mind when you configure ACL VLAN groups:
•The interfaces to which the ACL VLAN group are applied function as restricted interfaces. The ACL
VLAN group name is used to identify the group of VLANs that is used to perform hierarchical filtering.
•You can add only one ACL to an interface at a point in time.
•When you attempt to attach an ACL VLAN group to the same interface, a validation is performed to
determine whether an ACL is applied directly to an interface. If you previously applied an ACL
separately to the interface, an error occurs when you attempt to attach an ACL VLAN group to the
same interface.
The limitation on the maximum number of members that can be part of the ACL VLAN group is
•
determined by the type of switch and its hardware capabilities. This scaling limit depends on the
number of slices that are allocated for ACL CAM optimization. If one slice is allocated, the maximum
number of VLAN members is 256 for all ACL VLAN groups. If two slices are allocated, the maximum
number of VLAN members is 512 for all ACL VLAN groups.
•The maximum number of VLAN groups that you can configure also depends on the hardware
specifications of the switch. Each VLAN group is mapped to a unique ID in the hardware. The
maximum number of ACL VLAN groups supported is 31. Only a maximum two components (iSCSI
28
ACL VLAN Groups and Content Addressable Memory (CAM)
Page 29
counters, Open Flow, ACL optimization) can be allocated virtual flow processing slices at a point in
time.
•The maximum number of VLANs that you can configure as a member of ACL VLAN groups is limited
to 512 on the S4180, Z9000, and MXL switches if two slices are allocated. If only one virtual flow
processing slice is allocated, the maximum number of VLANs that you can configure as a member of
an ACL VLAN group is 256 for the S4810, Z9000, and MXL switches.
•Port ACL optimization is applicable only for ACLs that are applied without the VLAN range.
•You cannot view the statistical details of ACL rules per VLAN and per interface if you enable the ACL
VLAN group capability because this type of statistical information is available only for ACLs that are
separately applied to VLANs. You can view the counters per ACL only.
•To display information using a particular ACL name, although you cannot display this detail using a
specified interface name, you can use the show ip accounting access list command.
•Within a port, you can apply Layer 2 ACLs on a VLAN or a set of VLANs. In this case, CAM optimization
is not applied.
•To enable optimization of CAM space for Layer 2 or Layer 3 ACLs that are applied to ports, the port
number is removed as a qualifier for ACL application on ports, and port bits are used. When you apply
the same ACL to a set of ports, the port bitmap is set when the ACL flow processor entry is added.
When you remove the ACL from a port, the port bitmap is removed.
•If you do not attach an ACL to any of the ports, the flow processor entries are deleted. In this manner,
when the same ACL is applied on set of ports, only one set of entries is installed in the flow processor
(FP), thereby effectively saving CAM space. The optimization is enabled only if you specify the
optimized option with the ip access-group command. This option is not valid for VLAN and LAG
interfaces.
Configuring ACL VLAN Groups and Configuring FP Blocks
for VLAN Parameters
. This section contains the following topics that describe how to configure ACL VLAN groups that you can
attach to VLAN interfaces to optimize the utilization of CAM blocks and also how to configure flow
processor (FP) blocks for different VLAN operations.
Configuring ACL VLAN Groups
You can create an ACL VLAN group and attach the ACL with the VLAN members. The optimization is
applicable only when you create an ACL VLAN group. If you apply an ACL separately on the VLAN
interface, each ACL has a mapping with the VLAN and increased CAM space utilization occurs. Attaching
an ACL individually to VLAN interfaces is similar to the behavior of ACL-VLAN mapping storage in CAM
prior to the implementation of the ACL VLAN group functionality.
1.Create an ACL VLAN group
CONFIGURATION mode
acl-vlan-group {group name}
You can have up to eight different ACL VLAN groups at any given time.
2.Add a description to the ACL VLAN group.
CONFIGURATION (conf-acl-vl-grp) mode
description description
ACL VLAN Groups and Content Addressable Memory (CAM)
29
Page 30
3.Apply an egress IP ACL to the ACL VLAN group.
CONFIGURATION (conf-acl-vl-grp) mode
ip access-group {group name} out implicit-permit
4.Add VLAN member(s) to an ACL VLAN group.
CONFIGURATION (conf-acl-vl-grp) mode
member vlan {VLAN-range}
5.Display all the ACL VLAN Groups or display a specific ACL VLAN Group, identified by name.
CONFIGURATION (conf-acl-vl-grp) mode
show acl-vlan-group {group name | detail}
Dell#show acl-vlan-group detail
Group Name :
TestGroupSeventeenTwenty
Egress IP Acl :
SpecialAccessOnlyExpertsAllowed
Vlan Members :
100,200,300
Group Name :
CustomerNumberIdentificationEleven
Egress IP Acl :
AnyEmployeeCustomerElevenGrantedAccess
Vlan Members :
2-10,99
Group Name :
HostGroup
Egress IP Acl :
Group5
Vlan Members :
1,1000
Dell#
Configuring FP Blocks for VLAN Parameters
You can use the cam-acl-vlan command to allocate the number of FP blocks for the various VLAN
processes on the system. You can use the no version of this command to reset the number of FP blocks
to default. By default, 0 groups are allocated for the ACL in VCAP. ACL VLAN groups or CAM optimization
is not enabled by default, and you need to allocate the slices for CAM optimization.
1.Allocate the number of FP blocks for VLAN Open Flow operations.
CONFIGURATION mode
cam-acl-vlan vlanopenflow <0-2>
2.Allocate the number of FP blocks for VLAN iSCSI counters.
CONFIGURATION mode
cam-acl-vlan vlaniscsi <0-2>
3.Allocate the number of FP blocks for ACL VLAN optimization feature.
CONFIGURATION mode
cam-acl-vlan vlanaclopt <0-2>
30
ACL VLAN Groups and Content Addressable Memory (CAM)
Page 31
4.View the number of flow processor (FP) blocks that is allocated for the different VLAN services.
This functionality is supported on the S4810, S4820T, Z9000, I/O Aggregator, and MXL platforms.
View the amount of CAM space available, used, and remaining in each partition (including IPv4Flow and
Layer 2 ACL sub- partitions) using the show cam-usage command from EXEC Privilege mode
Display Layer 2, Layer 3, ACL, or all CAM usage statistics.
EXCE Privilege mode
show cam usage [acl | router | switch]
The following sample output shows the consumption of CAM blocks for Layer 2 and Layer 3 ACLs, in
addition to other processes that use CAM space:
This functionality is supported on the S4810, S4820T, Z9000, I/O Aggregator, and MXL platforms.
The VLAN ContentAware Processor (VCAP) application is a pre-ingress CAP that modifies the VLAN
settings before packets are forwarded. To support the ACL CAM optimization functionality, the CAM
carving feature is enhanced. A total of four VACP groups are present, of which two are for fixed groups
and the other two are for dynamic groups. Out of the total of two dynamic groups, you can allocate zero,
one, or two FP blocks to iSCSI Counters, OpenFlow and ACL Optimization.
You can configure only two of these features at a point in time.
•To allocate the number of FP blocks for VLAN open flow operations, use the cam-acl-vlan
vlanopenflow <0-2>
32
command.
ACL VLAN Groups and Content Addressable Memory (CAM)
Page 33
•To allocate the number of FP blocks for VLAN iSCSI counters , use the cam-acl-vlan vlaniscsi <0-2> command.
•To allocate the number of FP blocks for ACL VLAN optimization feature, use the cam-acl-vlan vlanaclopt <0-2> command.
You can use the no version of these commands to reset the number of FP blocks to default. By default, 0
groups are allocated for the ACL in VCAP. ACL VLAN groups or CAM optimization is not enabled by
default, and you need to allocate the slices for CAM optimization.
To display the number of FP blocks that is allocated for the different VLAN services, you can use the show cam-acl-vlan command. After CAM configuration for ACL VLAN groups is performed, you must
reboot the system to enable the settings to be stored in nonvolatile storage. During the initialization of
CAM, the chassis manager reads the NVRAM and allocates the dynamic VCAP regions.
member vlan
Add VLAN members to an ACL VLAN group.
Syntax
Parameters
DefaultNone
Command
Modes
Command
History
Usage
Information
member vlan {VLAN-range}
VLAN-range
CONFIGURATION (conf-acl-vl-grp)
Version 9.3.0.0Introduced on the S4810, S4820T, Z9000, I/O Aggregator,
At a maximum, there can be only 32 VLAN members in all ACL VLAN groups. A
VLAN can belong to only one group at any given time.
You can create an ACL VLAN group and attach the ACL with the VLAN members.
The optimization is applicable only when you create an ACL VLAN group. If you
apply an ACL separately on the VLAN interface, each ACL has a mapping with the
VLAN and increased CAM space utilization occurs.
Enter the member VLANs using comma-separated VLAN IDs,
a range of VLAN IDs, a single VLAN ID, or a combination. For
example:
Attaching an ACL individually to VLAN interfaces is similar to the behavior of ACLVLAN mapping storage in CAM prior to the implementation of the ACL VLAN group
functionality.
ACL VLAN Groups and Content Addressable Memory (CAM)
33
Page 34
ip access-group
Apply an egress IP ACL to the ACL VLAN group.
Syntax
Parameters
DefaultNone
Command
Modes
Command
History
Usage
Information
ip access-group {group name} out implicit-permit
group-nameEnter the name of the ACL VLAN group where you want the
outEnter the keyword out to apply the ACL to outgoing traffic.
implicit-permit
CONFIGURATION (conf-acl-vl-grp)
Version 9.3.0.0Introduced on the S4810, S4820T, Z9000, I/O Aggregator,
You can apply only an egress IP ACL on an ACL VLAN group.
show acl-vlan-group
egress IP ACLs applied, up to 140 characters.
Enter the keyword implicit-permit to change the default
action of the ACL from implicit-deny to implicit-permit (that
is, if the traffic does not match the filters in the ACL, the
traffic is permitted instead of dropped).
and MXL platforms
Display all the ACL VLAN groups or display a specific ACL VLAN group, identified by name.
Syntax
Parameters
DefaultNo default behavior or values
Command
Modes
Command
History
34
show acl-vlan-group {group-name | detail}
group-name(Optional) Display only the ACL VLAN group that is specified,
up to 140 characters.
detail
EXEC
EXEC Privilege
Version 9.3.0.0Introduced on the S4810, S4820T, Z9000, I/O Aggregator,
Display information in a line-by-line format to display the
names in their entirety.
Without the detail option, the output displays in a table style
and information may be truncated.
and MXL platforms
ACL VLAN Groups and Content Addressable Memory (CAM)
Page 35
Usage
Information
When an ACL-VLAN-Group name or the Access List Group Name contains more
than 30 characters, the name is truncated in the show acl-vlan-group
command output.
ExamplesThe following sample illustrates the output of the show acl-vlan-group
command.
NOTE: Some group names and some access list names are truncated.
Dell#show acl-vlan-group
Group Name Egress IP Acl Vlan
Members
TestGroupSeventeenTwenty SpecialAccessOnlyExperts
100,200,300
CustomerNumberIdentifica AnyEmployeeCustomerEleve 2-10,99
HostGroup Group5 1,1000
Dell#
The following sample output is displayed when using the show acl-vlan-group
group-name option.
NOTE: The access list name is truncated.
Dell#show acl-vlan-group TestGroupSeventeenTwenty
Group Name Egress IP Acl Vlan
Members
TestGroupSeventeenTwenty SpecialAccessOnlyExperts
100,200,300
Dell#
The following sample output shows the line-by-line style display when using the
show acl-vlan-group detail option.
NOTE: No group or access list names are truncated
Dell#show acl-vlan-group detail
Group Name :
TestGroupSeventeenTwenty
Egress IP Acl :
SpecialAccessOnlyExpertsAllowed
Vlan Members :
100,200,300
Group Name :
CustomerNumberIdentificationEleven
Egress IP Acl :
AnyEmployeeCustomerElevenGrantedAccess
Vlan Members :
2-10,99
Group Name :
HostGroup
Egress IP Acl :
Group5
Vlan Members :
1,1000
ACL VLAN Groups and Content Addressable Memory (CAM)
35
Page 36
Dell#
show cam-acl-vlan
Display the number of flow processor (FP) blocks that is allocated for the different VLAN services.
Syntax
Command
Modes
Command
History
Usage
Information
show cam-acl-vlan
EXEC Privilege
Version 9.3.0.0Introduced on the S4810, S4820T, Z9000, I/O Aggregator
and MXL platforms.
After CAM configuration for ACL VLAN groups is performed, you must reboot the
system to enable the settings to be stored in nonvolatile storage. During the
initialization of CAM, the chassis manager reads the NVRAM and allocates the
dynamic VCAP regions.
The following table describes the output fields of this show command:
FieldDescription
Chassis Vlan Cam ACLDetails about the CAM blocks allocated
for ACLs for various VLAN operations at
a system-wide, global level.
Stack Unit <number>Details about the CAM blocks allocated
for ACLs for various VLAN operations
for a particular stack unit.
Current Settings(in block sizes)Information about the number of FP
blocks that are currently in use or
allocated.
Example
36
VlanOpenFlowNumber of FP blocks for VLAN open
flow operations.
VlanIscsiNumber of FP blocks for VLAN internet
small computer system interface
(iSCSI) counters.
VlanHpNumber of FP blocks for VLAN high
performance processes.
VlanFcoeNumber of FP blocks for VLAN Fiber
Channel over Ethernet (FCoE)
operations.
VlanAclOptNumber of FP blocks for ACL VLAN
optimzation feature.
Dell#show cam-acl-vlan
-- Chassis Vlan Cam ACL - Current Settings(in block sizes)
ACL VLAN Groups and Content Addressable Memory (CAM)
defaultReset the number of FP blocks to default. By default, 0
groups are allocated for the ACL in VCAP. ACL VLAN groups
or CAM optimization is not enabled by default, and you need
to allocate the slices for CAM optimization.
vlanopenflow
<0-2>
vlaniscsi <0-2>Allocate the number of FP blocks for VLAN iSCSI counters.
vlanaclopt
<0-2>
allocated for VLAN processes are restored to their default values. No FP blocks or
dynamic VLAN ContentAware Processor (VCAP) groups are allocated for VLAN
operations by default.
CONFIGURATION
Version 9.3.0.0Introduced on the S4810 and Z9000 platforms.
Allocate the number of FP blocks for VLAN open flow
operations.
Allocate the number of FP blocks for the ACL VLAN
optimization feature.
Usage
Information
ACL VLAN Groups and Content Addressable Memory (CAM)
The VLAN ContentAware Processor (VCAP) application is a pre-ingress CAP that
modifies the VLAN settings before packets are forwarded. To support the ACL CAM
optimization functionality, the CAM carving feature is enhanced. A total of four
VACP groups are present, of which two are for fixed groups and the other two are
for dynamic groups. Out of the total of two dynamic groups, you can allocate zero,
one, or two flow processor (FP) blocks to iSCSI Counters, OpenFlow and ACL
Optimization. You can configure only two of these features at a point in time.
37
Page 38
show cam-usage
View the amount of CAM space available, used, and remaining in each partition (including IPv4Flow and
Layer 2 ACL sub-partitions).
Syntax
Parameters
Command
Modes
Command
History
Usage
Information
show cam-usage [acl | router | switch]
acl
router
switch
EXEC
EXEC Privilege
Version 9.3.0.0Introduced on the S4810, S4820T, Z9000, I/O Aggregator
The following regions must be provided in the show cam-usage output:
•L3AclCam
•L2AclCam
•V6AclCam
(OPTIONAL) Enter the keyword acl to display Layer 2 and
Layer 3 ACL CAM usage.
(OPTIONAL) Enter the keyword router to display Layer 3
CAM usage.
(OPTIONAL) Enter the keyword switch to display Layer 2
CAM usage.
and MXL platforms.
38
The following table describes the output fields of this show command:
FieldDescription
LineCardNumber of the line card that contains
information on ACL VLAN groups
PortpipeThe hardware path that packets follow
through a system for ACL optimization
CAM-RegionType of area in the CAM block that is
used for ACL VLAN groups
Total CAM spaceTotal amount of space in the CAM
block
Used CAMAmount of CAM space that is currently
in use
Available CAMAmount of CAM space that is free and
remaining to be allocated for ACLs
ACL VLAN Groups and Content Addressable Memory (CAM)
ACL VLAN Groups and Content Addressable Memory (CAM)
Page 41
show running config acl-vlan-group
Display the running configuration of all or a given ACL VLAN group.
Syntax
Parameters
DefaultNone
Command
Modes
Command
History
ExamplesThe following sample output shows the line-by-line style display when using the
show running config acl-vlan-group group name
group-name
EXEC
EXEC Privilege
Version 9.3.0.0Introduced on the S4810, S4820T, Z9000, I/O Aggregator,
show running-config acl-vlan-group option. Note that no group or access
list names are truncated
Dell#show running-config acl-vlan-group
!
acl-vlan-group group1
description Acl Vlan Group1
member vlan 1-10,400-410,500
ip access-group acl1 out implicit-permit
!
acl-vlan-group group2
member vlan 20
ip access-group acl2 out
Dell#
Display only the ACL VLAN group that is specified. The
maximum group name is 140 characters.
and MXL platforms
Dell#show running-config acl-vlan-group group1
!
acl-vlan-group group1
description Acl Vlan Group1
member vlan 1-10,400-410,500
ip access-group acl1 out implicit-permit
Dell#
acl-vlan-group
Create an ACL VLAN group.
Syntax
Parameters
ACL VLAN Groups and Content Addressable Memory (CAM)
acl-vlan-group {group name}
To remove an ACL VLAN group, use the no acl-vlan-group {group name}
command.
group-nameSpecify the name of the ACL VLAN group. The name can
contain a maximum 140 characters.
41
Page 42
DefaultNo default behavior or values
Command
Modes
Command
History
Usage
Information
CONFIGURATION
Version 9.3.0.0Introduced on the S4810, S4820T, Z9000, I/O Aggregator,
and MXL platforms
You can have up to eight different ACL VLAN groups at any given time. When you
configure an ACL VLAN group, you enter the ACL VLAN Group Configuration
mode.
To avoid the problem of excessive consumption of CAM area, you can configure
ACL VLAN groups that combines all the VLANs that are applied with the same ACL
in a single group. A unique identifier for each of ACL attached to the VLAN is used
as a handle or locator in the CAM area instead of the VLAN id. This method of
processing signficiantly reduces the number of entries in the CAM area and saves
memory space in CAM.
You can create an ACL VLAN group and attach the ACL with the VLAN members.
Optimization is applicable only when you create an ACL VLAN group. If you apply
an ACL separately on the VLAN interface, each ACL maps with the VLAN and
increased CAM space utilization occurs.
Attaching an ACL individually to VLAN interfaces is similar to the behavior of ACLVLAN mapping storage in CAM prior to the implementation of the ACL VLAN group
functionality.
show acl-vlan-group detail
Display all the ACL VLAN Groups or display a specific ACL VLAN Group by name. To display the names in
their entirety, the output displays in a line-by-line format.
Syntax
Parameters
DefaultNo default behavior or values
Command
Modes
Command
History
Usage
Information
show acl-vlan-group detail
detail
EXEC
EXEC Privilege
Version 9.3.0.0Introduced on the S4810, S4820T, Z9000, I/O Aggregator,
The output for this command displays in a line-by-line format. This allows the ACLVLAN-Group names (or the Access List Group Names) to display in their entirety.
Display information in a line-by-line format to display the
names in their entirety.
Without the detail option, the output is displayed in a table
style and information may be truncated.
and MXL platforms
42
ACL VLAN Groups and Content Addressable Memory (CAM)
Page 43
ExamplesThe following sample output shows the line-by-line style display when using the
show acl-vlan-group detail option. Note that no group or access list names
are truncated
Dell#show acl-vlan-group detail
Group Name :
TestGroupSeventeenTwenty
Egress IP Acl :
SpecialAccessOnlyExpertsAllowed
Vlan Members :
100,200,300
Group Name :
CustomerNumberIdentificationEleven
Egress IP Acl :
AnyEmployeeCustomerElevenGrantedAccess
Vlan Members :
2-10,99
Group Name :
HostGroup
Egress IP Acl :
Group5
Vlan Members :
1,1000
Dell#
description (ACL VLAN Group)
Add a description to the ACL VLAN group.
Syntax
Parameters
DefaultNo default behavior or values
Command
Modes
Command
History
Usage
Information
description description
descriptionEnter a description to identify the ACL VLAN group (80
characters maximum).
CONFIGURATION (conf-acl-vl-grp)
Version 9.3.0.0Introduced on the S4810, S4820T, Z9000, I/O Aggregator,
and MXL platforms
Enter a description for each ACL VLAN group that you create for effective and
streamlined administrative and logging purposes.
ACL VLAN Groups and Content Addressable Memory (CAM)
43
Page 44
44
Page 45
4
Access Control Lists
This chapter describes the access control list (ACL) enhancements and contains the following sections:
•Logging of ACL Processes
Logging of ACL Processes
This functionality is supported on the S4810, S4820T, Z9000, I/O Aggregator and MXL platforms.
To assist in streamlined, robust administration and management of traffic that traverses the device after
being validated by the configured ACLs, you can enable the generation of logs for access control list
(ACL) processes. Although you can configure ACLs with the required permit or deny filters to provide
access to the incoming packet or disallow access to a particular user, it is also necessary to monitor and
examine the traffic that passes through the device. To enable such a mechanism to evaluate network
traffic that is subjected to ACLs, you can configure the logs to be triggered for ACL operations. This
functionality is primarily needed for network supervision and maintenance activities of the handled
subscriber traffic.
If you configure logging of ACL activities, when a frame reaches an interface that is applied with an ACL
and a match occurs against that ACL, that is installed with logging enabled, then whenever a frame that
arrives at an interface hits a specific ACL entry, a log is generated to indicate details about the ACL entry
that matched the packet.
A packet floe through a network path is defined by the source and destination IP addresses, protocols,
and ports. Because the source port might differ for a new link between the same two hosts, instead of the
same flow being used, a new flow might be created.
When you enable the generation of ACL log messages, at times, depending on the volume of traffic, it is
possible that a large number of logs might be generated that can impact the system performance and
efficiency. To avoid a storm of ACL logs from being recorded, you can configure a rate-limiting
functionality to safeguard the system from an avalanche of ACL logs. You can specify the interval or
frequency at which ACL logs must be triggered and also the threshold or the limit for the maximum
number of logs to be generated. If you do not specify the frequency at which ACL logs must be
generated, a default interval of 5 minutes is used. Similarly, if you do not specify the threshold for ACL
logs, a default threshold of 10 is used, where this value refers to the number of packets that are matched
against an ACL .
A Layer 2 or Layer 3 ACL contains a set of defined rules that are saved as flow processor (FP) entries.
When you enable ACL logging for a particular ACL rule, a set of specific ACL rules translate to a set of FP
entries. You can enable logging for each of these FP entries separately, which relates to each of the ACL
entries configured in an ACL. For each ACL entry, the Dell Networking OS saves a table that maps each
ACL entry that matches the received packet with the ACL name, sequence number of the rule, and the
interface index in the database. When the configured maximum threshold is exceeded, generation of logs
is stopped. When the interval at which ACL logs are configured to be recorded expires, the subsequent,
fresh interval timer is started and the packet count for that new interval commences from zero. If ACL
logging was stopped previously because the configured threshold is exceeded, it is reenabled for this
new interval.
Access Control Lists
45
Page 46
The ACL application sends the ACL logging configuration information and other details, such as the
action, sequence number, and the ACL parameters that pertains to that ACL entry. The ACL service
collects the ACL log records and records the following attributes per log message.
•For non-IP packets, the ACL name, sequence number, ACL action (permit or deny), source and
destination MAC addresses, EtherType, and ingress interface are the logged attributes.
•For IP Packets, the ACL name, sequence number, ACL action (permit or deny), source and destination
MAC addresses, source and destination IP addresses, the transport layer protocol used are the logged
attributes.
•For IP packets that contain the transport layer protocol as Transmission Control Protocol (TCP) or
User Datagram Protocol (UDP), the ACL name, sequence number, ACL action (permit or deny), source
and destination MAC addresses, source and destination IP addresses, and the source and destination
port (which are Layer 4 parameters) are also recorded.
If the packet contains an unidentified EtherType or transport layer protocol, the values for these
parameters is saved as Unknown in the log message. If you also enable the count of packets for the ACL
entry for which you configured logging, and if the logging is deactivated in a specific interval owing to the
threshold being exceeded, the count of packets that exceeded the logging threshold value during that
interval is logged when the subsequent log record is generated for that ACL entry in a different window
or interval.
Guidelines for Configuring ACL Logging
This functionality is supported on the S4810, S4820T, Z9000, I/O Aggregator and MXL platforms.
Keep the following points in mind when you configure logging of ACL activities:
•During initialization, the ACL logging application tags the ACL rule indices for which a match
condition exists as being in-use, which ensures that the same rule indices are not reused by ACL
logging again.
•The ACL configuration information that the ACL logging application receives from the ACL manager
causes the allocation and clearance of the match rule number. A unique match rule number is
created for the combination of each ACL entry, sequence number, and interface parameters.
•A separate set of match indices is preserved by the ACL logging application for the permit and deny
actions. Depending on the action of an ACL entry, the corresponding match index is allocated from
the particular set that is maintained for permit and dent actions.
•The maximum number of ACL entries with permit action that can be logged is 125. The maximum
number of ACL entries with deny action that can be logged is 126.
•For virtual ACL entries, the same match rule number is reused. Similarly, when an ACL entry is deleted
that was previously enabled for ACL logging, the match rule number used by it is released back to the
pool or set of match indices that is present so that it can be reused for subsequent allocations.
•The ACL logging application saves the allocated match rule number in the ACL entry itself so that it
can be reused when the ACL entry is reprogrammed due to CAM changes.
•The allocated match rule number for an ACL entry is associated with an FP entry and saved in the
system. A timer control starts when an FP entry is added to the system or CPU with the logging
option, and the timer stops when the ACL entry is deleted. The ACL logger module obtains the ACL
name, sequence number, and interface index from the match rule index contained in the packet.
•A maximum of 15 ACL entries or records can be saved in the space that is allocated for ACL logging.
46
Access Control Lists
Page 47
•A timer control of 30 seconds is present in the ACL agent module, the expiry of which causes the log
records that are collocted until that time are transmitted to the ACL manager for logging. An interprocess communication (IPC) message is sent to the ACL manager by the ACL agent when a
maximum of 15 records are collected or the 30-second timer period is exceeded.
•If you enabled the count of packets for the ACL entry for which you configured logging, and if the
logging is deactivated in a specific interval owing to the threshold being exceeded, the count of
packets that exceeded the logging threshold value during that interval is logged when the subsequent
log record is generated for that ACL entry in a different window or interval.
•When you delete an ACL entry, the logging settings associated with it are also removed.
•ACL logging is supported for standard and extended IPv4 ACLs, IPv6 ACLs, and standard and extended
MAC ACLs.
•For ACL entries applied on port-channel interfaces, one match index for every member interface of
the port-channel interface is assigned. Therefore, the total available match indices of 251 are split (125
match indices for permit action and 126 match indices for the deny action).
•You can configure ACL logging only on ACLs that are applied to ingress interfaces; you cannot enable
logging for ACLs that are associated with egress interfaces.
•The total uniquely available match rule indices is 255 with four match indices used by other modules,
leaving 51 indices available for ACL logging.
Configuring ACL Logging
This functionality is supported on the S4810, S4820T, Z9000, I/O Aggregator and MXL platforms.
To configure the maximum number of ACL log messages to be generated and the frequency at which
these messages must be generated, perform the following:
NOTE: This example describes the configuration of ACL logging for standard IP access lists. You can
enable the logging capability for standard and extended IPv4, IPv6, and standard and extended MAC
ACLs.
1.Specify the maximum number of ACL logs or the threshold that can be generated by using the
threshold-in-msgs count option with the seq, permit, or deny commands. Upon exceeding the
specified maximum limit, the generation of ACL logs is terminated. You can enter a threshold in the
range of 1-100. By default, 10 ACL logs are generated if you do not specify the threshold explicitly.
2.Specify the interval in minutes at which ACL logs must be generated. You can enter an interval in the
range of 1-10 minutes. The default frequency at which ACL logs are generated is 5 minutes. If ACL
logging is stopped because the configured threshold is exceeded, it is reenabled after the logging
interval period elapses. ACL logging is supported for standard and extended IPv4 ACLs, IPv6 ACLs,
and standard and extended MAC ACLs. Configure ACL logging only on ACLs that are applied to
ingress interfaces; you cannot enable logging for ACLs that are associated with egress interfaces.
To drop packets with a certain IP address, configure a filter.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
Syntax
Parameters
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no deny {source [mask] | any | host ip-address}
command.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Command
Modes
Command
History
Usage
Information
48
The default frequency at which ACL logs are generated is 5 minutes.
CONFIGURATION-STANDARD-ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
Access Control Lists
Page 49
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
Related
Commands
ip access-list standard — configures a standard ACL.
permit — configures a permit filter.
deny (for Extended IP ACLs)
Configure a filter that drops IP packets meeting the filter criteria.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
Syntax
Parameters
deny {ip | ip-protocol-number} {source mask | any | host ipaddress} {destination mask | any | host ip-address} [count
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no deny {ip | ip-protocol-number} {source mask | any |
host ip-address} {destination mask | any | host ip-address}
command.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
Modes
Command
History
Access Control Lists
CONFIGURATION-EXTENDED-ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
49
Page 50
Usage
Information
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
Related
Commands
deny tcp — assigns a filter to deny TCP packets.
deny udp — assigns a filter to deny UDP packets.
ip access-list extended — creates an extended ACL.
seq (for Standard IPv4 ACLs)
Assign a sequence number to a deny or permit filter in an IP access list while creating the filter.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
To delete a filter, use the no seq sequence-number command.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
Modes
50
CONFIGURATION-STANDARD-ACCESS-LIST
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Access Control Lists
Page 51
Command
History
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
Usage
Information
Related
Commands
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
deny — configures a filter to drop packets.
permit — configures a filter to forward packets.
deny tcp (for Extended IP ACLs)
Configure a filter that drops transmission control protocol (TCP) packets meeting the filter criteria.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
Syntax
deny tcp {source mask | any | host ip-address} [bit] [operator
port [port]] {destination mask | any | host ip-address} [dscp]
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no deny tcp {source mask | any | host ip-address} {destination mask | any | host ip-address} command.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
51
Page 52
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Command
Modes
Command
History
Usage
Information
Related
Commands
CONFIGURATION-EXTENDED-ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
deny — assigns a filter to deny IP traffic.
deny udp — assigns a filter to deny UDP traffic.
deny udp (for Extended IP ACLs)
To drop user datagram protocol (UDP) packets meeting the filter criteria, configure a filter.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective
documentation set.
Syntax
52
Command Reference Guide of the applicable platform of the Release 9.2.0.0
deny udp {source mask | any | host ip-address} [operator port
[port]] {destination mask | any | host ip-address} [dscp]
[operator port [port]] [count [byte]] [order] [fragments] [log
[interval minutes] [threshold-in-msgs [count]]
To remove this filter, you have two choices:
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no deny udp {source mask | any | host ip-address} {destination mask | any | host ip-address} command.
Access Control Lists
Page 53
Parameters
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
Modes
Command
History
Usage
Information
CONFIGURATION-EXTENDED-ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
Related
Commands
deny — assigns a filter to deny IP traffic.
deny tcp — assigns a filter to deny TCP traffic.
deny arp (for Extended MAC ACLs)
Configure an egress filter that drops ARP packets on egress ACL supported line cards. (For more
information, refer to your line card documentation).
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no deny arp {destination-mac-address mac-address-mask
| any} vlan vlan-id {ip-address | any | opcode code-number}
command.
Parameters
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
Command
Modes
Command
History
Usage
Information
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
The default frequency at which ACL logs are generated is 5 minutes.
CONFIGURATION-EXTENDED-ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
deny icmp (for Extended IP ACLs)
To drop all or specific internet control message protocol (ICMP) messages, configure a filter.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
54
Access Control Lists
Page 55
Syntax
deny icmp {source mask | any | host ip-address} {destination
mask | any | host ip-address} [dscp] [message-type] [count
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no deny icmp {source mask | any | host ip-address} {destination mask | any | host ip-address} command.
Parameters
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
interval
minutes
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
CONFIGURATION-EXTENDED-ACCESS-LIST
Modes
Command
History
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
Usage
Information
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
Access Control Lists
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
55
Page 56
deny ether-type (for Extended MAC ACLs)
Configure an egress filter that drops specified types of Ethernet packets on egress ACL supported line
cards. (For more information, refer to your line card documentation).
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
Modes
Command
History
Usage
Information
56
CONFIGURATION-EXTENDED-ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
Access Control Lists
Page 57
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
deny (for Standard MAC ACLs)
To drop packets with a the MAC address specified, configure a filter.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective
documentation set.
Command Reference Guide of the applicable platform of the Release 9.2.0.0
Syntax
Parameters
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no deny {any | mac-source-address mac-source-address-
} command.
mask
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
The default frequency at which ACL logs are generated is 5 minutes.
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Command
Modes
Command
History
Usage
Information
Access Control Lists
CONFIGURATION-MAC ACCESS LIST-STANDARD
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
57
Page 58
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
Related
Commands
permit — configures a MAC address filter to pass packets.
seq — configures a MAC address filter with a specified sequence number.
deny (for Extended MAC ACLs)
To drop packets that match the filter criteria, configure a filter.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
Modes
Command
History
58
CONFIGURATION-MAC ACCESS LIST-EXTENDED
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
Access Control Lists
Page 59
Usage
Information
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
Related
Commands
permit — configures a MAC address filter to pass packets.
seq — configures a MAC address filter with a specified sequence number.
permit arp (for Extended MAC ACLs)
Configure a filter that forwards ARP packets meeting this criteria. This command is supported only on 12port GE line cards with SFP optics; refer to your line card documentation for specifications.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective
documentation set.
Syntax
Parameters
Command Reference Guide of the applicable platform of the Release 9.2.0.0
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the {destination-mac-address mac-address-mask | any} vlan vlan-id {ip-address | any | opcode code-number} command.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Access Control Lists
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
59
Page 60
Command
Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
Command
History
Usage
Information
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
permit ether-type (for Extended MAC ACLs)
Configure a filter that allows traffic with specified types of Ethernet packets. This command is supported
only on 12-port GE line cards with SFP optics. For specifications, refer to your line card documentation.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
Access Control Lists
Page 61
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Command
Modes
Command
History
Usage
Information
CONFIGURATION-EXTENDED-ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
permit icmp (for Extended IP ACLs)
Configure a filter to allow all or specific ICMP messages.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
Syntax
Parameters
Access Control Lists
permit icmp {source mask | any | host ip-address} {destination
mask | any | host ip-address} [dscp] [message-type] [count
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no permit icmp {source mask | any | host ip-address} {destination mask | any | host ip-address} command.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
61
Page 62
threshold-in
msgs count
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
Modes
Command
History
Usage
Information
CONFIGURATION-STANDARD-ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
permit udp (for Extended IP ACLs)
To pass UDP packets meeting the filter criteria, configure a filter.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
Syntax
62
permit udp {source mask | any | host ip-address} [operator port
[port]] {destination mask | any | host ip-address} [dscp]
[operator port [port]] [count [byte]] [order] [fragments] [log
[interval minutes] [threshold-in-msgs [count]]
To remove this filter, you have two choices:
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no permit udp {source mask | any | host ip-address} {destination mask | any | host ip-address command.
Access Control Lists
Page 63
Parameters
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
Modes
Command
History
Usage
Information
CONFIGURATION-EXTENDED-ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
Related
Commands
ip access-list extended — creates an extended ACL.
permit — assigns a permit filter for IP packets.
permit tcp — assigns a permit filter for TCP packets.
permit (for Extended IP ACLs)
To pass IP packets meeting the filter criteria, configure a filter.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no deny {source mask | any | host ip-address} {destination mask | any | host ip-address} command.
Parameters
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
interval
minutes
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
CONFIGURATION-EXTENDED-ACCESS-LIST
Modes
Command
History
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
Usage
Information
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
Related
Commands
64
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
ip access-list extended — creates an extended ACL.
permit tcp — assigns a permit filter for TCP packets.
permit udp — assigns a permit filter for UDP packets.
Access Control Lists
Page 65
permit (for Standard MAC ACLs)
To forward packets from a specific source MAC address, configure a filter.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
Syntax
Parameters
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no permit {any | mac-source-address mac-source-address-mask} command.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Command
Modes
Command
History
Usage
Information
Access Control Lists
The default frequency at which ACL logs are generated is 5 minutes.
CONFIGURATION-MAC ACCESS LIST-STANDARD
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
65
Page 66
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
Related
Commands
deny — configures a MAC ACL filter to drop packets.
seq —configure a MAC ACL filter with a specified sequence number.
seq (for Standard MAC ACLs)
To a deny or permit filter in a MAC access list while creating the filter, assign a sequence number.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
To remove this filter, use the no seq sequence-number command.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
Modes
Command
History
Usage
Information
66
CONFIGURATION-MAC ACCESS LIST-STANDARD
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
Access Control Lists
Page 67
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
Related
Commands
deny — configures a filter to drop packets.
permit — configures a filter to forward packets.
permit tcp (for Extended IP ACLs)
To pass TCP packets meeting the filter criteria, configure a filter.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
Syntax
Parameters
permit tcp {source mask | any | host ip-address} [bit]
[operator port [port]] {destination mask | any | host ip-address} [bit] [dscp] [operator port [port]] [count [byte]]
[order] [fragments] [log [interval minutes] [threshold-in-msgs
[count]]
To remove this filter, you have two choices:
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no permit tcp {source mask | any | host ip-address}
destination mask | any | host ip-address} command.
{
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
Modes
Command
History
Access Control Lists
CONFIGURATION-EXTENDED-ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
67
Page 68
Usage
Information
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
Related
Commands
ip access-list extended — creates an extended ACL.
permit — assigns a permit filter for IP packets.
permit udp — assigns a permit filter for UDP packets.
seq arp (for Extended MAC ACLs)
Configure an egress filter with a sequence number that filters ARP packets meeting this criteria. This
command is supported only on 12-port GE line cards with SFP optics. For specifications, refer to your line
card documentation.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
To remove this filter, use the no seq sequence-number command.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
68
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Access Control Lists
Page 69
Command
Modes
CONFIGURATION-EXTENDED-ACCESS-LIST
Command
History
Usage
Information
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
seq ether-type (for Extended MAC ACLs)
Configure an egress filter with a specific sequence number that filters traffic with specified types of
Ethernet packets. This command is supported only on 12-port GE line cards with SFP optics. For
specifications, refer to your line card documentation.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
To remove this filter, use the no seq sequence-number command.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
69
Page 70
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
Modes
Command
History
Usage
Information
CONFIGURATION-EXTENDED-ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
seq (for IP ACLs)
Assign a sequence number to a deny or permit filter in an extended IP access list while creating the filter.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Access Control Lists
Page 71
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
Modes
Command
History
Usage
Information
Related
Commands
CONFIGURATION-EXTENDED-ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
deny — configures a filter to drop packets.
permit — configures a filter to forward packets.
seq (for IPv6 ACLs)
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
Assign a sequence number to a deny or permit the filter in an IPv6 access list while creating the filter.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
Syntax
Parameters
Access Control Lists
seq sequence-number {deny | permit} {ipv6-protocol-number |
icmp | ip | tcp | udp} {source address mask | any | host ipv6-address} {destination address | any | host ipv6-address}
[operator port [port]] [count [byte]] [log [interval minutes]
[threshold-in-msgs [count]]
To delete a filter, use the no seq sequence-number command.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
71
Page 72
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Command
Modes
Command
History
Usage
Information
Related
Commands
ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
deny – configures a filter to drop packets.
permit – configures a filter to forward packets.
permit udp (for IPv6 ACLs)
Configure a filter to pass UDP packets meeting the filter criteria.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
Syntax
72
permit udp {source address mask | any | host ipv6-address}
[operator port [port]] {destination address | any | host ipv6-
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no permit udp {source address mask | any | host ipv6-
address} {destination address | any | host ipv6-address}
command.
Access Control Lists
Page 73
Parameters
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
Modes
Command
History
Usage
Information
ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
Related
Commands
permit – assigns a permit filter for IP packets.
permit tcp – assigns a permit filter for TCP packets.
permit tcp (for IPv6 ACLs)
Configure a filter to pass TCP packets that match the filter criteria.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
Syntax
Access Control Lists
permit tcp {source address mask | any | host ipv6-address}
[operator port [port]] {destination address | any | host ipv6-
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no permit tcp {source address mask | any | host ipv6-
address} {destination address | any | host ipv6-address}
command.
Parameters
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
interval
minutes
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
ACCESS-LIST
Modes
Command
History
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
Usage
Information
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
Related
Commands
74
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
permit – assigns a permit filter for IP packets.
permit udp – assigns a permit filter for UDP packets.
Access Control Lists
Page 75
permit icmp (for IPv6 ACLs)
To allow all or specific internet control message protocol (ICMP) messages, configure a filter.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
Syntax
Parameters
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
•Use the no seq sequence-number command if you know the filter’s
sequence number.
•Use the no permit icmp {source address mask | any | host ipv6-
address} {destination address | any | host ipv6-address}
command.
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Command
Modes
Command
History
Usage
Information
Access Control Lists
The default frequency at which ACL logs are generated is 5 minutes.
ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
75
Page 76
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
permit (for IPv6 ACLs)
To configure a filter that matches the filter criteria, select an IPv6 protocol number, ICMP, IPv6, TCP, or
UDP.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
Syntax
Parameters
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
•Use the no seq sequence-number command syntax if you know the filter’s
sequence number
•Use the no permit {ipv6-protocol-number | icmp | ipv6 | tcp | udp} command
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Command
Modes
Command
History
Usage
Information
76
The default frequency at which ACL logs are generated is 5 minutes.
ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
Access Control Lists
Page 77
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
deny udp (for IPv6 ACLs)
Configure a filter to drop user datagram protocol (UDP) packets meeting the filter criteria.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
Syntax
Parameters
deny udp {source address mask | any | host ipv6-address}
[operator port [port]] {destination address | any | host ipv6-
•Use the no seq sequence-number command syntax if you know the filter’s
sequence number
•Use the no deny udp {source address mask | any | host ipv6-
address} {destination address | any | host ipv6-address}
command
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
Modes
Access Control Lists
ACCESS-LIST
77
Page 78
Command
History
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
Usage
Information
Related
Commands
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
deny – assigns a filter to deny IP traffic.
deny tcp – assigns a deny filter for TCP traffic.
deny tcp (for IPv6 ACLs)
Configure a filter that drops TCP packets that match the filter criteria.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
Syntax
Parameters
78
deny tcp {source address mask | any | host ipv6-address}
[operator port [port]] {destination address | any | host ipv6-address} [bit] [operator port [port]] [count [byte]] [log
[interval minutes] [threshold-in-msgs [count]]
To remove this filter, you have two choices:
•Use the no seq sequence-number command syntax if you know the filter’s
sequence number
•Use the no deny tcp {source address mask | any | host ipv6-
address} {destination address | any | host ipv6-address}
command
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
Access Control Lists
Page 79
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Command
Modes
Command
History
Usage
Information
Related
Commands
ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
deny – assigns a filter to deny IP traffic.
deny udp – assigns a filter to deny UDP traffic.
deny icmp (for Extended IPv6 ACLs)
Configure a filter to drop all or specific ICMP messages.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
•Use the no seq sequence-number command syntax if you know the filter’s
sequence number
•Use the no deny icmp {source address mask | any | host ipv6-
address} {destination address | any | host ipv6-address}
command
79
Page 80
Parameters
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
The default frequency at which ACL logs are generated is 5 minutes.
Command
Modes
Command
History
Usage
Information
ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
deny (for IPv6 ACLs)
Configure a filter that drops IPv6 packets that match the filter criteria.
NOTE: Only the options that have been newly introduced are described here. For a complete
description on all of the keywords and variables that are available with this command, refer the
respective Command Reference Guide of the applicable platform of the Release 9.2.0.0
documentation set.
•Use the no seq sequence-number command syntax if you know the filter’s
sequence number
80
Access Control Lists
Page 81
•Use the no deny {ipv6-protocol-number | icmp | ipv6 | tcp | udp} command
Parameters
DefaultsBy default, 10 ACL logs are generated if you do not specify the threshold explicitly.
Command
Modes
Command
History
Usage
Information
log(OPTIONAL) Enter the keyword log to enable the triggering
of ACL log messages.
threshold-in
msgs count
interval
minutes
The default frequency at which ACL logs are generated is 5 minutes.
ACCESS-LIST
Version 9.3.0.0Added support for logging of ACLs on the S4810, S4820T,
When the configured maximum threshold is exceeded, generation of logs is
stopped. When the interval at which ACL logs are configured to be recorded
expires, the subsequent, fresh interval timer is started and the packet count for that
new interval commences from zero. If ACL logging was stopped previously
because the configured threshold is exceeded, it is reenabled for this new interval.
(OPTIONAL) Enter the threshold-in-msgs keyword
followed by a value to indicate the maximum number of ACL
logs that can be generated, exceeding which the generation
of ACL logs is terminated. with the seq, permit, or deny
commands. You can enter a threshold in the range of 1-100.
(OPTIONAL) Enter the keyword interval followed by the
time period in minutes at which ACL logs must be generated.
You can enter an interval in the range of 1-10 minutes.
Z9000, M I/O Aggregator and MXL 10/40GbE Switch IO
Module platforms.
If ACL logging is stopped because the configured threshold is exceeded, it is
reenabled after the logging interval period elapses. ACL logging is supported for
standard and extended IPv4 ACLs, standard and extended IPv6 ACLs, and standard
and extended MAC ACLs. You can configure ACL logging only on ACLs that are
applied to ingress interfaces; you cannot enable logging for ACLs that are
associated with egress interfaces.
Flow-Based Monitoring Support for ACLs
This functionality to enable flow-based monitoring is supported on the S4810, S4820T, S6000, Z9000,
I/O Aggregator, and MXL platforms.
Flow-based monitoring conserves bandwidth by monitoring only specified traffic instead all traffic on the
interface. This feature is particularly useful when looking for malicious traffic. It is available for Layer 2 and
Layer 3 ingresss traffic. You may specify traffic using standard or extended access-lists. This mechanism
copies all incoming packets on one port and forwards (mirrors) them to another port. The source port is
the monitored port (MD) and the destination port is the monitoring port (MG).
The port mirroring application maintains and performs all the monitoring operations on the chassis. ACL
information is sent to the ACL manager, which in turn notifies the ACL agent to add entries in the CAM
area. Duplicate entries in the ACL are not saved.
Access Control Lists
81
Page 82
When a packet arrives at a port that is being monitored, the packet is validated against the configured
ACL rules. If the packet matches an ACL rule, the system examines corresponding flow processor to
perform the action specified for that port. If mirroring action is set in the flow processor entry, the
destination port details, which indicates the port on the device to which the mirrored information must
be sent, are sent to the destination port.
When a stack unit is reset or a stack unit undergoes a failure, the ACL agent registers with the port
mirroring application. The port mirroring utility downloads the monitoring configuration to the ACL
agent. The interface manager notifies the port mirroring application about the removal of an interface
when an interface to which an ACL entry is associated is deleted.
Behavior of Flow-Based Monitoring
You can enter activate flow-based monitoring for a monitoring session by entering the flow-based
enable command in the Monitor Session mode. When you enable this capability, traffic with particular
flows that are traversing through the ingress interfaces are examined and, appropriate ACLs can be
applied in the ingress direction. By default, flow-based monitoring is not enabled.
You must specify the monitor option with the permit, deny, or seq command for ACLs that are
assigned to the source or the monitored port (MD) to enable the evaluation and replication of traffic that
is destined to the source port to the destination port. Enter the keyword monitor with the seq, permit
and deny ACL rules to allow or drop IPv4, IPv6, ARP, UDP, EtherType, ICMP, and TCP packets when the
rule is describing the traffic that you want to monitor and the ACL in which you are creating the rule will
be applied to the monitored interface. Flow monitoring is supported for standard and extended IPv4
ACLs, standard and extended IPv6 ACLs, and standard and extended MAC ACLs.
If the number of monitoring sessions increases, inter-process communication (IPC) bandwidth utilization
will be high. ACL manager might require a large bandwidth when you assign an ACL with many entries to
an interface.
The ACL agent module saves monitoring details in its local database and also in the CAM region to
monitor packets which match the specified criterion. The ACL agent maintains data on the source port,
destination port, and the endpoint to which the packet must be forwarded when a match occurs with the
ACL entry.
If you configure the flow-based enable command and do not apply an ACL on the source port or the
monitored port, both flow-based monitoring and port mirroring do not function. Flow-based monitoring
is supported only for ingress traffic and not for egress packets.
The port mirroring application maintains database that contains all monitoring sessions (including port
monitor sessions). It has information regarding the sessions that are enabled for flow-based monitoring
and those sessions that are not enabled for flow-based monitoring. It downloads monitoring
configuration to the ACL agent whenever the ACL agent is registered with the port mirroring application
or when flow-based monitoring is enabled.
The show monitor session session-id command has been enhanced to display the Type field in
the output, which indicates whether a particular session is enabled for flow-monitoring.
Example Output of the show Command
E1200-maa-01#show running-config monitor session
!
monitor session 11
flow-based enable
source GigabitEthernet 13/0 destination GigabitEthernet 13/1 direction both
82
Access Control Lists
Page 83
The show running-config monitor session displays whether flow-based monitoring is enabled for
a particular session.
Example Output of the show Command
E1200-maa-01#show running-config monitor session
!
monitor session 11
flow-based enable
source GigabitEthernet 13/0 destination GigabitEthernet 13/1 direction both
The show config command has been modified to display monitoring configuration in particular
session.
Example Output of the show Command
E1200-maa-01(conf-mon-sess-11)#show config
!
monitor session 11
flow-based enable
source GigabitEthernet 13/0 destination GigabitEthernet 13/1 direction
both
The show ip | mac | ipv6 accounting commands have been enhanced to display whether
monitoring is enabled for traffic that match with the rule of the specific ACL rules.
Example Output of the show Command
Force10# show ip accounting access-list
!
Extended Ingress IP access list kar on GigabitEthernet 10/0
Total cam count 1
seq 5 permit ip 192.168.20.0/24 173.168.20.0/24 monitor
Force10#show mac accounting access-list kar in gi 10/0 out
Egress Extended mac access-list kar on GigabitEthernet 10/0
seq 5 permit host 11:11:11:11:11:11 host 22:22:22:22:22:22 monitor
seq 10 permit host 22:22:22:22:22:22 any monitor
seq 15 permit host 00:0f:fe:1e:de:9b host 0a:0c:fb:1d:fc:aa monitor
Force10#show ipv6 accounting access-list
!
Ingress IPv6 access list kar on GigabitEthernet 10/0
Total cam count 1
seq 5 permit ipv6 22::/24 33::/24 monitor
Access Control Lists
83
Page 84
Enabling Flow-Based Monitoring
Flow-based monitoring is supported on the S4810, S4820T, S6000, Z9000, I/O Aggregator, and MXL
platforms.
Flow-based monitoring conserves bandwidth by monitoring only specified traffic instead all traffic on the
interface. This feature is particularly useful when looking for malicious traffic. It is available for Layer 2 and
Layer 3 ingress and egress traffic. You may specify traffic using standard or extended access-lists.
1.Enable flow-based monitoring for a monitoring session.
MONITOR SESSION mode
flow-based enable
2.Define in access-list rules that include the keyword monitor. FTOS only considers for port
monitoring traffic matching rules with the keyword monitor.
CONFIGURATION mode
ip access-list
Refer to Access Control Lists (ACLs).
3.Apply the ACL to the monitored port.
INTERFACE mode
ip access-group access-list
To view an access-list that you applied to an interface, use the show ip accounting access-list
command from EXEC Privilege mode.
Example of the flow-based enable Command
FTOS(conf)#monitor session 0
FTOS(conf-mon-sess-0)#flow-based enable
FTOS(conf)#
FTOS(config-ext-nacl)#seq 5 permit icmp any any count bytes monitor
FTOS(config-ext-nacl)#seq 10 permit ip 102.1.1.0/24 any count bytes monitor
FTOS(config-ext-nacl)#seq 15 deny udp any any count bytes
FTOS(config-ext-nacl)#seq 20 deny tcp any any count bytes
FTOS(config-ext-nacl)#exit
FTOS(conf)#interface gig 1/1
FTOS(conf-if-gi-1/1)#ip access-group testflow in
FTOS(conf-if-gi-1/1)#show config
!
interface GigabitEthernet 1/1
ip address 10.11.1.254/24
ip access-group testflow in
shutdown
FTOS(conf-if-gi-1/1)#exit
FTOS(conf)#do show ip accounting access-list testflow
!
Extended Ingress IP access list testflow on GigabitEthernet 1/1
Total cam count 4
seq 5 permit icmp any any monitor count bytes (0 packets 0 bytes)
seq 10 permit ip 102.1.1.0/24 any monitor count bytes (0 packets 0 bytes)
seq 15 deny udp any any count bytes (0 packets 0 bytes)
seq 20 deny tcp any any count bytes (0 packets 0 bytes)
FTOS(conf)#do show monitor session 0
SessionID Source Destination Direction Mode Type
--------- ------ ----------- --------- ---- ---0 Gi 1/1 Gi 1/2 rx interface Flow-based
ip access-list ext testflow
84
Access Control Lists
Page 85
5
Bare Metal Provisioning (BMP)
This chapter describes the Bare Metal Provisioning (BMP) enhancements that apply to the S4810, S4820T,
S6000, Z9000, and MXL platforms
Support for BMP on the S6000 Switch
Starting with Dell Networking OS Release 9.3(0.0), BMP 3.1 is supported on the S6000 platform. For
details about the commands and configuration procedures of BMP 3.1, refer the Open Automation Guide.
Enhanced Behavior of the stop bmp Command
The stop bmp command behaves as follows in different circumstances:
•While FTOS image upgrade is in-progress, aborts the BMP process once the FTOS image is upgraded.
•When applying configurations from file, aborts the BMP process after all configurations are applied in
the system.
•When running pre-configuration or post-configuration scripts, stops execution of the script and
aborts the BMP process immediately.
•While downloading the configuration or script file, aborts BMP process after download, neither applies
configuration nor runs the script.
When you enter the CONFIGURATION mode during the BMP process, warning or error messages are
displayed appropriately to avoid any configuration conflicts between user and the BMP process.
Removal of the Deprecated User-Defined String
Parameter With reload-type Command
The user-defined-string parameter available with the reload-type command, which was
deprecated in Dell Networking OS release 9.2(0.0) and earlier, is now removed. The
identifier parameter replaces the user-defined-string parameter.
vendor-class-
Inclusion of Service Tag Information in the Option 60
String
You can now configure the vendor class identifier up to a maximum of 128 characters. In the vendor
class identifier (option 60) string, the User String field is also included with the Type, Hardware, Serial
Number, Service Tag and OS Version fields.
Bare Metal Provisioning (BMP)
85
Page 86
Replacement of stop jump-start Command With the stop
bmp Command
The deprecated stop jump-start command is replaced by the stop bmp from BMP 3.1 onwards.
However, in BMP 1.5 and 2.0, you can use the stop jump-start command to stop the device from
restarting in BMP mode.
86
Bare Metal Provisioning (BMP)
Page 87
6
Data Center Bridging (DCB)
This chapter describes the DCB enhancements and contains the following sections:
•Managing Hardware Buffer Statistics
•Configuring WRED and ECN Attributes
•Enabling Buffer Statistics Tracking
•Configuring DCB Maps and its Attributes
•Data Center Bridging: Default Configuration
•Configuring the Dynamic Buffer Method
•Priority-Based Flow Control Using Dynamic Buffer Method
Configuring DCB Maps and its Attributes
This topic contains the following sections that describe how to configure a DCB map, apply the
configured DCB map to a port, configure PFC without a DCB map, and configure lossless queues. This
functionality is supported S4810, S4820T, S6000, I/O Aggregator, and MXL platforms.
DCB Map: Configuration Procedure
A DCB map consists of PFC and ETS parameters. By default, PFC is not enabled on any 802.1p priority
and ETS allocates equal bandwidth to each priority. To configure user-defined PFC and ETS settings, you
must create a DCB map.
StepTaskCommandCommand Mode
1
2
Data Center Bridging (DCB)
Enter global configuration mode to create a
DCB map or edit PFC and ETS settings.
Configure the PFC setting (on or off) and the
ETS bandwidth percentage allocated to traffic
in each priority group or whether priority
group traffic should be handled with strict
priority scheduling. You can enable PFC on a
maximum of two priority queues on an
interface. Enabling PFC for dot1p priorities
makes the corresponding port queue lossless.
The sum of all allocated bandwidth
percentages in all groups in the DCB map
must be 100%. Strict-priority traffic is serviced
first. Afterwards, bandwidth allocated to other
priority groups is made available and allocated
according to the specified percentages. If a
priority group does not use its allocated
bandwidth, the unused bandwidth is made
available to other priority groups.
Example: priority-group 0 bandwidth 60 pfc offpriority-group 1 bandwidth 20 pfc on
dcb-map nameCONFIGURATION
priority-group group_num
{bandwidth percentage |
strict-priority} pfc {on |
off}
DCB MAP
87
Page 88
StepTaskCommandCommand Mode
priority-group 2 bandwidth 20 pfc on
priority-group 4 strict-priority pfc off
Repeat this step to configure PFC and ETS
traffic handling for each priority group.
3
Specify the dot1p priority-to-priority group
mapping for each priority. Priority-group
range: 0 to 7. All priorities that map to the
same queue must be in the same priority
group.
Leave a space between each priority group
number. For example: priority-pgid 0 0 0 1 2 4 4 4 in which priority group 0 maps to dot1p
priorities 0, 1, and 2; priority group 1 maps to
dot1p priority 3; priority group 2 maps to
dot1p priority 4; priority group 4 maps to
dot1p priorities 5, 6, and 7.
•If you remove a dot1p priority-to-priority group mapping from a DCB map (no priority pgid
command), the PFC and ETS parameters revert to their default values on the interfaces on which the
DCB map is applied. By default, PFC is not applied on specific 802.1p priorities; ETS assigns equal
bandwidth to each 802.1p priority.
As a result, PFC and lossless port queues are disabled on 802.1p priorities, and all priorities are
mapped to the same priority queue and equally share port bandwidth.
•To change the ETS bandwidth allocation configured for a priority group in a DCB map, do not modify
the existing DCB map configuration. Instead, first create a new DCB map with the desired PFC and
ETS settings and apply the new map to the interfaces to override the previous DCB map settings. Then
delete the original dot1p priority-priority group mapping.
If you delete the dot1p priority-priority group mapping (no priority pgid command) before you apply
the new DCB map, the default PFC and ETS parameters are applied on the interfaces. This change
may create a DCB mismatch with peer DCB devices and interrupt network operation.
Applying a DCB Map on a Port
When you apply a DCB map with PFC enabled on an S6000 interface, a memory buffer for PFC-enabled
priority traffic is automatically allocated. The buffer size is allocated according to the number of PFCenabled priorities in the assigned map.
To apply a DCB map to an Ethernet port, follow these steps:
StepTaskCommandCommand Mode
88
1
2
Enter interface configuration mode on an
Ethernet port.
Apply the DCB map on the Ethernet port to
configure it with the PFC and ETS settings in
the map; for example:
FTOS# interface tengigabitEthernet 0/0
interface
{tengigabitEthernet slot/
port | fortygigabitEthernet
slot/port}
dcb-map nameINTERFACE
CONFIGURATION
Data Center Bridging (DCB)
Page 89
StepTaskCommandCommand Mode
FTOS(config-if-te-0/0)# dcb-map SAN_A_dcb_map1 Repeat Steps 1 and 2 to
apply a DCB map to more than one port.
You cannot apply a DCB map on an interface
which has been already configured for PFC
using the pfc priority command or which is
already configured for lossless queues (pfc no-
drop queues command).
Configuring PFC without a DCB Map
In a network topology that uses the default ETS bandwidth allocation (assigns equal bandwidth to each
priority), you can also enable PFC for specified dot1p-priorities on individual interfaces without using a
DCB map. This type of DCB configuration is useful on interfaces which require PFC for lossless traffic but
do not transmit converged Ethernet traffic.
StepTaskCommandCommand Mode
1Enter interface configuration mode on an
Ethernet port.
2Enable PFC on specified priorities. Range:
0-7. Default: None.
Maximum number of loss less queues
supported on an Ethernet port: 2.
Separate priority values with a comma.
Specify a priority range with a dash, for
example: pfc priority 3,5-7
1.You cannot configure PFC using the pfc priority command on an interface on
which a DCB map has been applied or
which is already configured for lossless
queues (pfc no-drop queues
command).
Configuring Lossless Queues
DCB also supports the manual configuration of lossless queues on an interface after you disable PFC
mode in a DCB map and apply the map on the interface. The configuration of no-drop queues provides
flexibility for ports on which PFC is not needed but lossless traffic should egress from the interface.
Lossless traffic egresses out the no-drop queues. Ingress 802.1p traffic from PFC-enabled peers is
automatically mapped to the no-drop egress queues.
When configuring lossless queues on a port interface, take into account:
•By default, no lossless queues are configured on a port.
•A limit of two lossless queues are supported on a port. If the number of lossless queues configured
exceeds the maximum supported limit per port (two), an error message displays. You must
reconfigure the value to a smaller number of queues.
•If you configure lossless queues on an interface that already has a DCB map with PFC enabled (pfc on), an error message displays.
Data Center Bridging (DCB)
89
Page 90
StepTaskCommandCommand Mode
1Enter INTERFACE Configuration mode.interface
{tengigabitEthernet slot/port |
fortygigabitEthernet
slot/port}
2
3
4
5
6
Open a DCB map and enter DCB map
configuration mode.
Disable PFC.no pfc mode onDCB MAP
Return to interface configuration mode.exitDCB MAP
Apply the DCB map created to disable PFC
operation on the interface
Configure the port queues that still function
as no-drop queues for lossless traffic. For
the dot1p-queue assignments, see Table 131.
The maximum number of lossless queues
globally supported on a port is 2.
You cannot configure PFC no-drop queues
on an interface on which a DCB map with
PFC enabled has been applied or which is
already configured for PFC using the pfc priority command.
Range: 0-3. Separate queue values with a
comma; specify a priority range with a dash;
for example: pfc no-drop queues 1,3 or pfc
no-drop queues 2-3 Default: No lossless
queues are configured.
dcb-map nameINTERFACE
dcb-map {name |
default}
pfc no-drop queues
queue-range
CONFIGURATION
INTERFACE
INTERFACE
Data Center Bridging: Default Configuration
This functionality is supported on the S6000 platform.
Before you configure PFC and ETS on an S5000 switch (see Configuring DCB Maps and its Attributes),
take into account the following default settings:
DCB is enabled (see Enabling Data Center Bridging).
The PFC memory buffer supports up to 64 PFC-enabled ports and two lossless queues per port.
PFC and ETS are globally enabled by default:
The default dot1p priority-queue assignments are applied as follows:
802.1p value in incoming frame:01234567
Egress queue assignment00012333
PFC is not applied on specific dot1p priorities.
ETS: Equal bandwidth is assigned to each port queue and each dot1p priority in a priority group.
To configure PFC and ETS parameters on an S5000 interface, you must specify a PFC mode and ETS
bandwidth allocation for a priority group and an 802.1p priority-to-priority group mapping in a DCB map
(see Configuring PFC and ETS in a DCB Map). No default PFC and ETS settings are applied to Ethernet
interfaces.
90
Data Center Bridging (DCB)
Page 91
Configuring PFC and ETS in a DCB Map
An S6000 switch supports the use of a DCB map in which you configure priority-based flow control and
enhanced transmission selection settings. To configure PFC and ETS parameters, you must apply a DCB
map on an S6000 interface. This functionality is supported on the S6000 platform.
PFC Configuration Notes
Priority-based flow control (PFC) provides a flow control mechanism based on the 802.1p priorities in
converged Ethernet traffic received on an interface and is enabled by default when you enable DCB. As
an enhancement to the existing Ethernet pause mechanism, PFC stops traffic transmission for specified
priorities (CoS values) without impacting other priority classes. Different traffic types are assigned to
different priority classes.
When traffic congestion occurs, PFC sends a pause frame to a peer device with the CoS priority values of
the traffic that needs to be stopped. DCBx provides the link-level exchange of PFC parameters between
peer devices. PFC allows network administrators to create zero-loss links for SAN traffic that requires nodrop service, while at the same time retaining packet-drop congestion management for LAN traffic.
On an S6000 switch, PFC is enabled by default on Ethernet ports (pfc mode on command). You can
configure PFC parameters using a DCB map or the pfc priority command in Interface configuration
mode. For more information, see Configuring DCB Maps and its Attributes.
NOTE: DCB maps are supported only on physical Ethernet interfaces.
When you configure PFC in a DCB map:
•As soon as you apply a DCB map with PFC enabled on an interface, DCBx starts exchanging
information with a peer. The IEEE802.1Qbb, CEE and CIN versions of PFC TLV are supported. DCBx
also validates PFC configurations that are received in TLVs from peer devices.
By applying a DCB map with PFC enabled, you enable PFC operation on ingress port traffic. To achieve
complete lossless handling of traffic, configure PFC priorities on all DCB egress ports.
•To remove a DCB map, including the PFC configuration it contains, use the no dcb map command in
Interface configuration mode.
•To disable PFC operation on an interface, use the no pfc mode on command in DCB-Map
configuration mode.
•Traffic may be interrupted when you reconfigure PFC no-drop priorities in a DCB map or re-apply the
DCB map to an interface.
•For PFC to be applied, the configured priority traffic must be supported by a PFC peer (as detected by
DCBx).
•If you apply a DCB map with PFC disabled (pfc off):
•You can enable link-level flow control on the interface (flowcontrol rx on tx on command; see Using
Ethernet Pause Frames for Flow Control). To delete the DCB map, first disable link-level flow control.
PFC is then automatically enabled on the interface because an interface is PFC-enabled by default.
•To ensure no-drop handling of lossless traffic, PFC allows you to configure lossless queues on a port
(see Configuring DCB Maps and its Attributes).
•When you configure a DCB map, an error message displays if:
•The PFC dot1p priorities result in more than two lossless queues.
Data Center Bridging (DCB)
91
Page 92
•When you apply a DCB map, an error message displays if:
•Link-level flow control is already enabled on an interface. You cannot enable PFC and link-level flow
control at the same time on an interface.
•In a switch stack, configure all stacked ports with the same PFC configuration.
•FTOS allows you to change the default dot1p priority-queue assignments only if the change satisfies
the following requirements in DCB maps already applied to S6000 interfaces:
•All 802.1p priorities mapped to the same queue must be in the same priority group.
•A maximum of two PFC-enabled, lossless queues are supported on an interface.
Otherwise the reconfiguration of a default dot1p-queue assignment is rejected.
•To ensure complete no-drop service, apply the same PFC parameters on all PFC-enabled peers.
PFC Prerequisites and Restrictions
On an S6000 switch, PFC is globally enabled by default, but not applied on specific 802.1p priorities. To
enable PFC on 802.1p priorities, create a DCB map. For more information, see Configuring DCB Maps
and its Attributes.
The following prerequisites and restrictions apply when you configure PFC in a DCB map:
•You can enable PFC on a maximum of two priority queues on an interface. Enabling PFC for dot1p
priorities configures the corresponding port queue as lossless.
•You cannot enable PFC and link-level flow control at the same time on an interface.
ETS Configuration Notes
ETS provides a way to optimize bandwidth allocation to outbound 802.1p classes of converged Ethernet
traffic. Different traffic types have different service needs. Using ETS, you can create groups within an
802.1p priority class to configure different treatment for traffic with different bandwidth, latency, and
best-effort needs.
When you configure ETS in a DCB map:
•The DCB map associates a priority group with a PFC operational mode (on or off) and an ETS
scheduling and bandwidth allocation. You can apply a DCB map on multiple egress ports.
•Use the ETS configuration associated with 802.1p priority traffic in a DCB map in DCBx negotiation
with ETS peers.
•Traffic in priority groups is assigned to strict-queue or weighted round-robin (WRR) scheduling in an
ETS configuration and is managed using the ETS bandwidth-assignment algorithm. FTOS de-queues
all frames of strict-priority traffic before servicing any other queues. A queue with strict-priority traffic
can starve other queues in the same port.
•ETS-assigned bandwidth allocation and strict-priority scheduling apply only to data queues, not to
control queues.
•FTOS supports hierarchical scheduling on an interface. FTOS control traffic is redirected to control
queues as higher priority traffic with strict priority scheduling. After the control queues drain out, the
remaining data traffic is scheduled to queues according to the bandwidth and scheduler configuration
in the DCB map. The available bandwidth calculated by the ETS algorithm is equal to the link
bandwidth after scheduling non-ETS higher-priority traffic.
92
Data Center Bridging (DCB)
Page 93
•The configuration of bandwidth allocation and strict-queue scheduling is not supported at the same
time for a priority group.
•Bandwidth assignment: By default, equal bandwidth is assigned to each dot1p priority in a priority
group. To configure the bandwidth assigned to the port queues associated with dot1p priorities in a
priority group, use the bandwidthpercentage parameter. The sum of the bandwidth allocated to all
priority groups in a DCB map must be 100% of the bandwidth on the link. You must allocate at least
1% of the total bandwidth to each priority group.
•Scheduling of priority traffic: dot1p priority traffic on the switch is scheduled to the current queue
mapping. dot1p priorities within the same queue must have the same traffic properties and scheduling
method.
•ETS configuration error: If an error occurs in an ETS configuration, the configuration is ignored and
the scheduler and bandwidth allocation settings are reset to the ETS default value: 100% of available
bandwidth is allocated to priority group 0 and bandwidth is equally assigned to each dot1p priority.
If an error occurs when a port receives a peer’s ETS configuration, the port’s configuration resets to the
ETS configuration in the previously configured DCB map. If no DCB map was previously applied, the port
resets to the default ETS parameters.
ETS Prerequisites and Restrictions
On an S6000 switch, ETS is enabled by default on Ethernet ports; equal bandwidth is assigned to each
802.1p priority. You can change the default ETS configuration only by using a DCB map. For more
information, see Configuring DCB Maps and its Attributes.
The following prerequisites and restrictions apply when you configure ETS bandwidth allocation or strict-
priority queuing in a DCB map:
•When allocating bandwidth or configuring strict-priority queuing for dot1p priorities in a priority group
on a DCBx CIN interface, take into account the CIN bandwidth allocation (see Configuring Bandwidth
Allocation for DCBx CIN) and dot1p-queue mapping.
•Although ETS bandwidth allocation or strict-priority queuing does not support weighted random early
detection (WRED), explicit congestion notification (ECN), rate shaping, and rate limiting because these
parameters are not negotiated by DCBx with peer devices, you can apply a QoS output policy with
WRED and/or rate shaping on a DCBx CIN-enabled interface (see Configuring Port-based Rate
Shaping and Weighted Random Early Detection). In this case, the WRED or rate shaping configuration
in the QoS output policy must take into account the bandwidth allocation or queue scheduler
configured in the DCB map.
Priority-Group Configuration Notes
When you configure priority groups in a DCB map:
•A priority group consists of 802.1p priority values that are grouped together for similar bandwidth
allocation and scheduling, and that share the same latency and loss requirements. All 802.1p priorities
mapped to the same queue must be in the same priority group.
•In a DCB map, each 802.1p priority must map to a priority group.
•The maximum number of priority groups supported in a DCB map on an interface is equal to the
number of data queues (4) on the port. Each priority group can support more than one data queue.
•You can enable PFC on a maximum of two priority queues on an interface.
Data Center Bridging (DCB)
93
Page 94
•If you configure more than one priority group as strict priority, the higher numbered priority queue is
given preference when scheduling data traffic.
dcb-map
Create a DCB map to configure priority flow control (PFC) and enhanced transmission selection (ETS) on
Ethernet ports that support converged Ethernet traffic. Apply the DCB map to an Ethernet interface.
S4810, S6000, and FC Flex IO Modules with MXL and I/O Aggregator
Syntax
Parameters
DefaultsNone. There are no pre-configured PFC and ETS settings on S5000 Ethernet
Command
Modes
Command
History
Usage
Information
dcb-map map-name
map-nameEnter a DCB map name. The maximum number of
alphanumeric characters is 32.
interfaces.
CONFIGURATION
INTERFACE
Version 9.3.0.0Introduced on the S4810 and S6000 platforms.
Version 9.3.0.0Introduced on the FC Flex IO module installed in the M I/O
Aggregator and MXL 10/40GbE Switch.
A DCB map is a template used to configure DCB parameters and apply them on
converged Ethernet interfaces. DCB parameters include priority-based flow control
(PFC) and enhanced traffic selection (ETS).
To display the PFC and ETS settings in DCB maps, enter the show qos dcb-map
command.
Use the dcb-map command to create a DCB map to specify PFC and ETS settings
and apply it on Ethernet ports. After you apply a DCB map to an interface, the PFC
and ETS settings in the map are applied when the Ethernet port is enabled. DCBx is
enabled on Ethernet ports by default.
The dcb-map command is supported only on physical Ethernet interfaces.
To remove a DCB map from an interface, enter the no dcb-map map-name
command in Interface configuration mode.
Related
Commands
94
show qos dcb-map– displays the dcb-map profiles configured on the system.
dcb-map stack-unit all stack-ports all– applies a DCB map on all ports of a switch
stack.
Data Center Bridging (DCB)
Page 95
priority-pgid
Assign 802.1p priority traffic to a priority group in a DCB map.
S4810, S6000, and FC Flex IO Modules with MXL and I/O Aggregator
Enter the priority group number for each 802.1p class of
traffic in a DCB map.
DefaultsNone
Command
Modes
Command
History
Usage
Information
Data Center Bridging (DCB)
DCB MAP
Version 9.3.0.0Introduced on the S4810 and S6000 platforms.
Version 9.3.0.0Introduced on the FC Flex IO module installed in the M I/O
PFC and ETS settings are not pre-configured on Ethernet ports. You must use the
dcb-map command to configure different groups of 802.1p priorities with PFC and
ETS settings.
Using the priority-pgid command, you assign each 802.1p priority to one
priority group. A priority group consists of 802.1p priority values that are grouped
together for similar bandwidth allocation and scheduling, and that share latency
and loss requirements. All 802.1p priorities mapped to the same queue must be in
the same priority group. For example, the
command creates the following groups of 802.1p priority traffic:
Aggregator and MXL 10/40GbE Switch.
priority-pgid 0 0 0 1 2 4 4 4
95
Page 96
•Priority group 0 contains traffic with dot1p priorities 0, 1, and 2.
•Priority group 1 contains traffic with dot1p priority 3.
•Priority group 2 contains traffic with dot1p priority 4.
•Priority group 4 contains traffic with dot1p priority 5, 6, and 7.
To remove a priority-pgid configuration from a DCB map, enter the no priority-pgid command.
Related
Commands
dcb-map — creates a DCB map to configure PFC and ETS parameters and applies
the PFC and ETS settings on Ethernet ports.
priority-group bandwidth pfc— configures the ETS bandwidth allocation and the
PFC setting used to manage the port traffic in an 802.1p priority group.
pfc mode on
Enable the PFC configuration on the port so that the priorities are included in DCBX negotiation with peer
PFC devices.
Syntax
DefaultsPFC mode is on.
Command
Modes
Command
History
Usage
Information
pfc mode on
To disable the PFC configuration, use the no pfc mode on command.
DCB INPUT POLICY
Version 9.3.0.0Introduced on the M I/O Aggregator and MXL 10/40GbE
Switch with the FC Flex IO module.
By applying a DCB input policy with PFC enabled, you enable PFC operation on
ingress port traffic. To achieve complete lossless handling of traffic, also enable
PFC on all DCB egress ports or configure the dot1p priority-queue assignment of
PFC priorities to lossless queues (refer to pfc no-drop queues).
To disable PFC operation on an interface, enter the no pfc mode on command in
DCB Input Policy Configuration mode. PFC is enabled and disabled as global DCB
operation is enabled (dcb-enable) or disabled (no dcb-enable).
You cannot enable PFC and link-level flow control at the same time on an
interface.
Related
Commands
96
dcb-input — creates a DCB input policy.
Data Center Bridging (DCB)
Page 97
priority-group bandwidth pfc
Configure the ETS bandwidth allocation and PFC mode used to manage port traffic in an 802.1p priority
group.
S4810, S6000, and FC Flex IO Modules with MXL and I/O Aggregator
strict-priorityConfigure the priority-group traffic to be handled with strict
pfc {on | off}Configure whether priority-based flow control is enabled
DCB MAP
Version 9.3.0.0Introduced on the S4810 and S6000 platforms.
Version 9.3.0.0Introduced on the FC Flex IO module installed in the M I/O
Enter the keyword priority-group followed by the
number of an 802.1p priority group. Use the
pgid command to create the priority groups in a DCB map.
Enter the keyword bandwidth followed by a bandwidth
percentage allocated to the priority group. The range of valid
values is 1 to 100. The sum of all allocated bandwidth
percentages in priority groups in a DCB map must be 100%.
priority scheduling. Strict-priority traffic is serviced first,
before bandwidth allocated to other priority groups is made
available.
(on) or disabled (off) for port traffic in the priority group.
Aggregator and MXL 10/40GbE Switch.
priority-
Usage
Information
Data Center Bridging (DCB)
Use the dcb-map command to configure priority groups with PFC and/or ETS
settings and apply them to Ethernet interfaces.
Use the priority-pgid command to map 802.1p priorities to a priority group.
You can assign each 802.1p priority to only one priority group. A priority group
consists of 802.1p priority values that are grouped together for similar bandwidth
allocation and scheduling, and that share latency and loss requirements. All 802.1p
priorities mapped to the same queue must be in the same priority group.
Repeat the priority-group bandwidth pfc command to configure PFC and
ETS traffic handling for each priority group in a DCB map.
You can enable PFC on a maximum of two priority queues.
If you configure more than one priority group as strict priority, the higher
numbered priority queue is given preference when scheduling data traffic.
97
Page 98
If a priority group does not use its allocated bandwidth, the unused bandwidth is
made available to other priority groups.
To remove a priority-group configuration in a DCB map, enter the no priority-group bandwidth pfc command.
By default, equal bandwidth is assigned to each dot1p priority in a priority group.
Use the bandwidth parameter to configure the bandwidth percentage assigned to
a priority group. The sum of the bandwidth allocated to all priority groups in a DCB
map must be 100% of the bandwidth on the link. You must allocate at least 1% of
the total port bandwidth to each priority group.
Related
Commands
dcb-map – creates a DCB map to configure PFC and ETS parameters and applies
the PFC and ETS settings on Ethernet ports.
priority-pgid – configures the 802.1p priority traffic in a priority group for a DCB
map.
dcb-map stack-unit all stack-ports all
Apply the specified DCB map on all ports of the switch stack.
S4810, S6000, and FC Flex IO Modules with MXL and I/O Aggregator
Syntax
Parameters
Defaultsnone
Command
Modes
dcb-map stack-unit all stack-ports all dcb-map-nameTo remove the PFC and ETS settings in a DCB map from all stack units, use the no
dcb-map stack-unit all stack-ports all command.
dcb-mapname
CONFIGURATION
Enter the name of the DCB map.
Command
History
Usage
Information
Related
Commands
98
Version 9.3.0.0Introduced on the S4810 and S6000 platforms.
Version 9.3.0.0Introduced on the FC Flex IO module installed in the M I/O
Aggregator and MXL 10/40GbE Switch.
The dcb-map stack-unit all stack-ports all command overwrites any
previous DCB maps applied to stack ports.
dcb-map – creates a DCB map to configure PFC and ETS parameters and applies
the PFC and ETS settings on Ethernet ports.
Data Center Bridging (DCB)
Page 99
show qos dcb-map
Display the DCB parameters configured in a specified DCB map.
S4810, S6000, and FC Flex IO Modules with MXL and I/O Aggregator
Syntax
Parameters
Command
Modes
Command
History
Usage
Information
show qos dcb-map map-name
map-nameDisplays the PFC and ETS parameters configured in the
specified map.
•EXEC
•EXEC Privilege
Version 9.3.0.0Introduced on the S4810 and S6000 platforms.
Version 9.3.0.0Introduced on the FC Flex IO module installed in the M I/O
Aggregator and MXL 10/40GbE Switch.
Use the show qos dcb-map command to display the enhanced transmission
selection (ETS) and priority-based flow control (PFC) parameters used to configure
server-facing Ethernet ports. S5000 Ethernet ports are DCBx-enabled by default.
The following table describes the show qos dcb-map output shown in the
example below.
FieldDescription
StateComplete: All mandatory DCB parameters are correctly
configured. In progress: The DCB map configuration is not
complete. Some mandatory parameters are not configured.
PFC ModePFC configuration in DCB map: On (enabled) or Off.
PGPriority group configured in the DCB map.
TSATransmission scheduling algorithm used by the priority
BWPercentage of bandwidth allocated to the priority group.
PFCPFC setting for the priority group: On (enabled) or Off.
Priorities802.1p priorities configured in the priority group.
dcb-map — creates a DCB map to configure PFC and ETS parameters and applies
the PFC and ETS settings on Ethernet ports.
Priority-Based Flow Control Using Dynamic Buffer
Method
Priority-based flow control using dynamic buffer spaces is supported on the S4810, S4820T, S6000, and
MXL platforms.
In a data center network, priority-based flow control (PFC) manages large bursts of one traffic type in
multiprotocol links so that it does not affect other traffic types and no frames are lost due to congestion.
When PFC detects congestion on a queue for a specified priority, it sends a pause frame for the 802.1p
priority traffic to the transmitting device.
Pause and Resume of Traffic
The pause message is a mechanism that is used by the sending device to inform the receiving device
regarding a congested, heavily-loaded traffic state that has been identified. When the interface of a
sending device transmits a pause frame, the recipient acknowledges this frame by temporarily halting the
transmission of data packets. The sending device requests the recipient to restart the transmission of data
traffic when the congestion eases and reduces. The time period that is specified in the pause frame
defines the duration for which the flow of data packets is halted. When the time period elapses, the
transmission restarts.
When a device sends a pause frame to another device, the time for which the sending of packets from
the other device must be stopped is contained in the pause frame. The device that sent the pause frame
empties the buffer to be less than the threshold value and restarts the acceptance of data packets.
Dynamic ingress buffering enables the sending of pause frames at different thresholds based on the
number of ports that experience congestion at a point in time. This behavior impacts the total buffer size
used by a particular lossless priority on an interface. The pause and resume thresholds can also be
configured dynamically. You can configure a buffer size, pause threshold, ingress shared threshold
weight, and resume threshold to control and manage the total amount of buffers that are to be used in
your network environment.
All the PFC-related settings such as the DCB input and output policies or DCB maps are saved in the DCB
application and the Differentiated Services Manager (DSM) application. All of these configurations can be
modified only for interfaces that are enabled for DCB. The DCB buffer configurations are also saved in the
DCB and DSM databases.
Buffer Sizes for Lossless or PFC Packets
You can configure up to a maximum of 4 lossless (PFC) queues. By configuring 4 lossless queues, you
can configure 4 different priorities and assign a particular priority to each application that your network is
used to process. For example, you can assign a higher priority for time-sensitive applications and a lower
priority for other services, such as file transfers. You can configure the amount of buffer space to be
allocated for each priority and the pause or resume thresholds for the buffer. This method of
configuration enables you to effectively manage and administer the behavior of lossless queues.
Although the system contains 9 MB of space for shared buffers, a minimum guaranteed buffer is provided
to all the internal and external ports in the system for both unicast and multicast traffic. This minimum
100
Data Center Bridging (DCB)
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.