DELL 9.8(0.0) User Manual

Page of 1910
Usage 
Information
When you use the log option, the CP processor logs detail the packets that match. 
Depending on how many packets match the log entry and at what rate, the CP 
may become busy as it has to log these packets’ details.
NOTE: When you configure the ACL logging and byte counters 
simultaneously, byte counters may display an incorrect value. Configure 
packet counters with logging instead.
Related 
Commands
 — configures a MAC address filter with a specified sequence number.
mac access-list extended
Name a new or existing extended MAC access control list (extended MAC ACL).
Syntax
mac access-list extended access-list-name [cpu-qos
To delete a MAC access list, use the no mac access-list extended access-
list-name
 command.
Parameters
access-list-
name
Enter a text string as the MAC access list name, up to 140 
characters.
cpu-qos
Enter the keywords cpu-qos to assign this ACL to control 
plane traffic only (CoPP).
Defaults
none
Command 
Modes
CONFIGURATION
Command 
History
This guide is platform-specific. For command information about other platforms, 
refer to the relevant Dell Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version
Description
9.7(0.0)
Introduced on the S6000–ON.
9.0.2.0
Introduced on the S6000.
8.3.19.0
Introduced on the S4820T.
8.3.11.1
Introduced on the Z9000.
8.3.10.0
Introduced on the S4810.
8.1.1.0
Introduced on the E-Series ExaScale.
7.8.1.0
Increased the name string to accept up to 140 characters. 
Prior to 7.8.1.0, names were up to 16 characters long.
Access Control Lists (ACL)
277