Dell(conf-if-te-1/1/1/1)#show config!TenGigabitEthernet 1/1/1/1no ip addressip access-group abcd outno shutdownDell(conf-if-te-1/1/1/1)#endDell#configure terminalDell(conf)#ip access-list extended abcdDell(config-ext-nacl)#permit tcp any anyDell(config-ext-nacl)#deny icmp any anyDell(config-ext-nacl)#permit 1.1.1.2Dell(config-ext-nacl)#endDell#show ip accounting access-list!Extended Ingress IP access list abcd on gigethernet 0/0seq 5 permit tcp any anyseq 10 deny icmp any anyseq 15 permit 1.1.1.2Dell#configure terminalDell(conf)#interface te 1/1/2/1Dell(conf-if-te-1/1/2/1)#ip vrf forwarding blueDell(conf-if-te-1/1/1/2/1)#show config!interface TenGigabitEthernet 1/1/2/1ip vrf forwarding blueno ip addressshutdownDell(conf-if-te-1/1/2/1)#Dell(conf-if-te-1/1/2/1)#Dell(conf-if-te-1/1/2/1)#endDell#Applying Egress Layer 3 ACLs (Control-Plane)By default, packets originated from the system are not filtered by egress ACLs.For example, if you initiate a ping session from the system and apply an egress ACL to block this type of traffic on the interface, the ACLdoes not affect that ping traffic. The Control Plane Egress Layer 3 ACL feature enhances IP reachability debugging by implementingcontrol-plane ACLs for CPU-generated and CPU-forwarded traffic. Using permit rules with the count option, you can track on a per-flowbasis whether CPU-generated and CPU-forwarded packets were transmitted successfully.1 Apply Egress ACLs to IPv4 system traffic.CONFIGURATION modeip control-plane [egress filter]2 Apply Egress ACLs to IPv6 system traffic.CONFIGURATION modeipv6 control-plane [egress filter]3 Create a Layer 3 ACL using permit rules with the count option to describe the desired CPU traffic.CONFIG-NACL modepermit ip {source mask | any | host ip-address} {destination mask | any | host ip-address}countDell Networking OS Behavior: Virtual router redundancy protocol (VRRP) hellos and internet group management protocol (IGMP) packetsare not affected when you enable egress ACL filtering for CPU traffic. Packets sent by the CPU with the source address as the VRRPvirtual IP address have the interface MAC address instead of VRRP virtual MAC address.Access Control Lists (ACLs) 121