Chapter 9
| Access Control Lists
IPv4 ACLs
– 273 –
destination
– Destination IP address.
address-bitmask
– Decimal number representing the address bits to match.
host
– Keyword followed by a specific IP address.
precedence
– IP precedence level. (Range: 0-7)
tos
– Type of Service level. (Range: 0-15)
dscp
– DSCP priority level. (Range: 0-63)
sport
– Protocol
4
source port number. (Range: 0-65535)
dport
– Protocol
4
destination port number. (Range: 0-65535)
port-bitmask
– Decimal number representing the port bits to match.
(Range: 0-65535)
control-flags
– Decimal number (representing a bit string) that specifies flag
bits in byte 14 of the TCP header. (Range: 0-63)
flag-bitmask
– Decimal number representing the code bits to match.
time-range-name
- Name of the time range.
(Range: 1-30 characters)
Default Setting
None
Command Mode
Extended IPv4 ACL
Command Usage
◆
All new rules are appended to the end of the list.
◆
Address bit masks are similar to a subnet mask, containing four integers from 0
to 255, each separated by a period. The binary mask uses 1 bits to indicate
“match” and 0 bits to indicate “ignore.” The bit mask is bitwise ANDed with the
specified source IP address, and then compared with the address for each IP
packet entering the port(s) to which this ACL has been assigned.
◆
You can specify both Precedence and ToS in the same rule. However, if DSCP is
used, then neither Precedence nor ToS can be specified.
◆
The control-code bitmask is a decimal number (representing an equivalent bit
mask) that is applied to the control code. Enter a decimal number, where the
equivalent binary bit “1” means to match a bit and “0” means to ignore a bit.
The following bits may be specified:
■
1 (fin) – Finish
■
2 (syn) – Synchronize
■
4 (rst) – Reset
■
8 (psh) – Push
■
16 (ack) – Acknowledgement
4. Includes TCP, UDP or other protocol types.
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...