Example
FTOS#show mac accounting access-list mac-ext interface po 1
Extended mac access-list mac-ext on GigabitEthernet 0/11
  seq 5 permit host 00:00:00:00:00:11 host 00:00:00:00:00:19 
count (393794576 packets)
  seq 10 deny  host 00:00:00:00:00:21 host 00:00:00:00:00:29 
count (89076777 packets)
  seq 15 deny  host 00:00:00:00:00:31 host 00:00:00:00:00:39 
count (0 packets)
  seq 20 deny  host 00:00:00:00:00:41 host 00:00:00:00:00:49 
count (0 packets)
  seq 25 permit any any count (0 packets)
Extended mac access-list mac-ext on GigabitEthernet 0/12
  seq 5 permit host 00:00:00:00:00:11 host 00:00:00:00:00:19 
count (57589834 packets)
  seq 10 deny  host 00:00:00:00:00:21 host 00:00:00:00:00:29 
count (393143077 packets)
  seq 15 deny  host 00:00:00:00:00:31 host 00:00:00:00:00:39 
count (0 packets)
  seq 20 deny  host 00:00:00:00:00:41 host 00:00:00:00:00:49 
count (0 packets)
  seq 25 permit any any count (0 packets)
FTOS#
Standard MAC ACL Commands
When you create an access control list without any rule and then apply it to an interface, the ACL behavior reflects 
implicit permit. These commands configure standard MAC ACLs.
The C-Series and S-Series platforms (except the S4810 system) support Ingress MAC ACLs only.
The S4810 and Z9000 support both Ingress and Egress MAC ACLs.
NOTE: For more information, also refer to the Commands Common to all ACL Types and Common MAC Access List 
Commands sections.
deny
Configure a filter to drop packets with a the MAC address specified.
C-Series, E-Series, S-Series, Z-Series
Syntax
deny {any | mac-source-address [mac-source-address-mask]} 
[count [byte]] [log] [monitor]
To remove this filter, you have two choices:
• Use the no seq sequence-number command if you know the filter’s sequence 
number.
• Use the no deny {any | mac-source-address mac-source-
address-mask} command.
Parameters
any Enter the keyword any to specify that all routes are subject to the 
filter.
265