implementing control-plane ACLs for CPU-generated and CPU-forwarded traffic. Using permit rules with the count option, you cantrack on a per-flow basis whether CPU-generated and CPU-forwarded packets were transmitted successfully.1. Apply Egress ACLs to IPv4 system traffic.CONFIGURATION modeip control-plane [egress filter]2. Apply Egress ACLs to IPv6 system traffic.CONFIGURATION modeipv6 control-plane [egress filter]3. Create a Layer 3 ACL using permit rules with the count option to describe the desired CPU traffic.CONFIG-NACL modepermit ip {source mask | any | host ip-address} {destination mask | any | host ip-address} countFTOS Behavior: Virtual router redundancy protocol (VRRP) hellos and internet group management protocol (IGMP) packets are notaffected when you enable egress ACL filtering for CPU traffic. Packets sent by the CPU with the source address as the VRRP virtualIP address have the interface MAC address instead of VRRP virtual MAC address.IP Prefix ListsIP prefix lists control routing policy. An IP prefix list is a series of sequential filters that contain a matching criterion (examine IP routeprefix) and an action (permit or deny) to process routes. The filters are processed in sequence so that if a route prefix does notmatch the criterion in the first filter, the second filter (if configured) is applied. When the route prefix matches a filter, DellNetworking OS drops or forwards the packet based on the filter’s designated action. If the route prefix does not match any of thefilters in the prefix list, the route is dropped (that is, implicit deny).A route prefix is an IP address pattern that matches on bits within the IP address. The format of a route prefix is A.B.C.D/X whereA.B.C.D is a dotted-decimal address and /X is the number of bits that should be matched of the dotted decimal address. Forexample, in 112.24.0.0/16, the first 16 bits of the address 112.24.0.0 match all addresses between 112.24.0.0 to 112.24.255.255.The following examples show permit or deny filters for specific routes using the le and ge parameters, where x.x.x.x/x represents aroute prefix:• To deny only /8 prefixes, enter deny x.x.x.x/x ge 8 le 8.• To permit routes with the mask greater than /8 but less than /12, enter permit x.x.x.x/x ge 8.• To deny routes with a mask less than /24, enter deny x.x.x.x/x le 24.• To permit routes with a mask greater than /20, enter permit x.x.x.x/x ge 20.The following rules apply to prefix lists:• A prefix list without any permit or deny filters allows all routes.• An “implicit deny” is assumed (that is, the route is dropped) for all route prefixes that do not match a permit or deny filter in aconfigured prefix list.• After a route matches a filter, the filter’s action is applied. No additional filters are applied to the route.Implementation InformationIn Dell Networking OS, prefix lists are used in processing routes for routing protocols (for example, router information protocol [RIP],open shortest path first [OSPF], and border gateway protocol [BGP]).NOTE: It is important to know which protocol your system supports prior to implementing prefix-lists.Access Control Lists (ACLs) 97