C
OMMAND
L
INE
I
NTERFACE
3-176
no
{
permit | deny
}
{
udp
} {
any
|
source bitmask |
host
source
}
{
any
|
destination bitmask |
host
destination
}
[source-port
source-port
] [destination-port
destination-port
]
•
any
– Any IP address (source if first field, destination if second
field).
•
source
– Source IP address.
•
destination
– Destination IP address.
•
bitmask
– Decimal number representing the address bits to match.
•
host
– Keyword followed by a specific IP address.
•
source-port
– TCP/UDP source port number. (Range: 0-65535)
•
destination-port
– TCP/UDP destination port number. (Range:
0-65535)
•
protocol-number
– A specific protocol number. (Range: 0-255)
•
control-flag
– Decimal number (representing a bit string) that specifies
flag bits in byte 14 of the TCP header. (Range: 0-63)
•
flag-bitmask
– Decimal number representing the code bits to match.
Default Setting
None
Command Mode
Extended ACL
Command Usage
• All new rules are added to the end of the list.
• Address bitmasks are similar to a subnet mask, containing four integers
from 0 to 255, each separated by a period. The binary mask uses 1 bit
to indicate “match” and 0 bits to indicate “ignore.” The bitmask is
bitwise ANDed with the specified source IP address, and then
compared with the address for each IP packet entering the port(s) to
which this ACL has been assigned.
• You can specify both Precedence and ToS in the same rule. However,
if DSCP is used, then neither Precedence nor ToS can be specified.
Summary of Contents for 6724AL2
Page 2: ......
Page 404: ...COMMAND LINE INTERFACE 3 216 ...
Page 406: ...TROUBLESHOOTING A 2 ...
Page 418: ...GLOSSARY Glossary 8 ...
Page 422: ...INDEX Index 4 ...
Page 423: ......