![background image](http://html.mh-extra.com/html/smc-networks/6128l2/6128l2_management-manual_1300638417.webp)
A
CCESS
C
ONTROL
L
IST
C
OMMANDS
4-117
uses 1 bits to indicate “match” and 0 bits to indicate “ignore.” The
bitmask is bitwise ANDed with the specified source IP address, and
then compared with the address for each IP packet entering the port(s)
to which this ACL has been assigned.
Example
This example configures one permit rule for the specific address 10.1.1.21
and another rule for the address range 168.92.16.x – 168.92.31.x using a
bitmask.
Related Commands
access-list ip (4-115)
permit
,
deny
(Extended ACL)
This command adds a rule to an Extended IP ACL. The rule sets a
filter condition for packets with specific source or destination IP
addresses, protocol types, source or destination protocol ports, or TCP
control codes. Use the
no
form to remove a rule.
Syntax
[
no
] {
permit
|
deny
} [
protocol
-
number |
udp
]
{
any
|
source address-bitmask |
host
source
}
{
any
|
destination address-bitmask |
host
destination
}
[
source-port
sport
[
end
]] [
destination-port
dport
[
end
]]
[
no
] {
permit
|
deny
}
tcp
{
any
|
source address-bitmask |
host
source
}
{
any
|
destination address-bitmask |
host
destination
}
[
source-port
sport
[
end
]] [
destination-port
dport
[
end
]]
•
protocol-number
– A specific protocol number. (Range: 0-255)
•
source
– Source IP address.
•
destination
– Destination IP address.
•
address-bitmask
– Decimal number representing the address bits to
match.
•
host
– Keyword followed by a specific IP address.
Console(config-std-acl)#permit host 10.1.1.21
Console(config-std-acl)#permit 168.92.16.0 255.255.240.0
Console(config-std-acl)#
Summary of Contents for 6128L2
Page 2: ......
Page 21: ...CONTENTS xvii Glossary Index ...
Page 22: ...CONTENTS xviii ...
Page 26: ...TABLES xxii ...
Page 40: ...INTRODUCTION 1 10 ...
Page 54: ...INITIAL CONFIGURATION 2 14 ...
Page 193: ...PORT CONFIGURATION 3 139 Figure 3 61 Displaying Etherlike and RMON Statistics ...
Page 257: ...QUALITY OF SERVICE 3 203 Figure 3 90 Configuring Policy Maps ...
Page 313: ...COMMAND GROUPS 4 13 PE Privileged Exec VC VLAN Database Configuration ...
Page 592: ...TROUBLESHOOTING B 4 ...
Page 605: ......