Example of Viewing Filter Sequence for a Specified Extended ACLDell(config-ext-nacl)#deny tcp host 123.55.34.0 anyDell(config-ext-nacl)#permit udp 154.44.123.34 0.0.255.255 host 34.6.0.0Dell(config-ext-nacl)#show config!ip access-list extended nimuleseq 5 deny tcp host 123.55.34.0 anyseq 10 permit udp 154.44.0.0 0.0.255.255 host 34.6.0.0Dell(config-ext-nacl)#To view all configured IP ACLs and the number of packets processed through the ACL, use the show ipaccounting access-list command in EXEC Privilege mode, as shown in the first example inConfigure a Standard IP ACL Filter.Configure Layer 2 and Layer 3 ACLsBoth Layer 2 and Layer 3 ACLs may be configured on an interface in Layer 2 mode.If both L2 and L3 ACLs are applied to an interface, the following rules apply:• When Dell Networking OS routes the packets, only the L3 ACL governs them because they are notfiltered against an L2 ACL.• When Dell Networking OS switches the packets, first the L3 ACL filters them, then the L2 ACL filtersthem.• When Dell Networking OS switches the packets, the egress L3 ACL does not filter the packet.For the following features, if you enable counters on rules that have already been configured and a newrule is either inserted or prepended, all the existing counters are reset:• L2 ingress access list• L3 egress access list• L2 egress access listIf a rule is simply appended, existing counters are not affected.Table 6. L2 and L3 Filtering on Switched PacketsL2 ACL Behavior L3 ACL Behavior Decision on Targeted TrafficDeny Deny L3 ACL denies.Deny Permit L3 ACL permits.Permit Deny L3 ACL denies.Permit Permit L3 ACL permits.NOTE: If you configure an interface as a vlan-stack access port, only the L2 ACL filters the packets.The L3 ACL applied to such a port does not affect traffic. That is, existing rules for other features(such as trace-list, policy-based routing [PBR], and QoS) are applied to the permitted traffic.For information about MAC ACLs, refer to Layer 2.112 Access Control Lists (ACLs)