A
CCESS
C
ONTROL
L
ISTS
8-6
•
Source/Destination IP Address
– Source or destination IP address.
•
Source/Destination Subnet Mask
– Subnet mask for source or
destination address. (See the description for SubMask on page 8-4.)
•
Service Type
– Packet priority settings based on the following criteria:
-
Precedence
– IP precedence level. (Range: 0-8, where 8 means any)
-
TOS
– Type of Service level. (Range: 0-16, where 16 means any)
-
DSCP
– DSCP priority level. (Range: 0-64, where 64 means any)
•
Protocol
– Specifies the protocol type to match as TCP, UDP or Others,
where others indicates a specific protocol number (0-255). (Options:
TCP, UDP, Others; Default: TCP)
•
Source/Destination Port
– Source/destination port number for the
specified protocol type. (Range: 0-65535)
•
Source/Destination Port
Bit Mask
– Decimal number representing
the port bits to match. (Range: 0-65535)
•
Control Code
– Decimal number (representing a bit string) that
specifies flag bits in byte 14 of the TCP header. (Range: 0-63)
•
Control Code Bit Mask
– Decimal number representing the code bits
to match.
The control bitmask is a decimal number (for an equivalent binary bit
mask) that is applied to the control code. Enter a decimal number, where
the equivalent binary bit “1” means to match a bit and “0” means to
ignore a bit. The following bits may be specified:
- 1 (fin) – Finish
- 2 (syn) – Synchronize
- 4 (rst) – Reset
- 8 (psh) – Push
- 16 (ack) – Acknowledgement
- 32 (urg) – Urgent pointer
For example, use the code value and mask below to catch packets with
the following flags set:
- SYN flag valid, use control-code 2, control bitmask 2
- Both SYN and ACK valid, use control-code 18, control bitmask 18
- SYN valid and ACK invalid, use control-code 2, control bitmask 18
Summary of Contents for 7824M/FSW - annexe 1
Page 2: ......
Page 24: ...TABLE OF CONTENTS xxiv ...
Page 28: ...TABLES xxviii ...
Page 32: ...FIGURES xxxii Figure 16 3 DNS Cache 16 7 ...
Page 34: ...GETTING STARTED ...
Page 46: ...SYSTEM DEFAULTS 1 12 ...
Page 62: ...SWITCH MANAGEMENT ...
Page 74: ...CONFIGURING THE SWITCH 3 12 ...
Page 112: ...BASIC MANAGEMENT TASKS 4 38 ...
Page 168: ...USER AUTHENTICATION 6 30 ...
Page 223: ...SHOWING PORT STATISTICS 9 33 Figure 9 12 Port Statistics ...
Page 230: ...ADDRESS TABLE SETTINGS 10 6 ...
Page 304: ...CLASS OF SERVICE 13 16 ...
Page 316: ...QUALITY OF SERVICE 14 12 ...
Page 338: ...MULTICAST FILTERING 15 22 ...
Page 346: ...DOMAIN NAME SERVICE 16 8 ...
Page 348: ...COMMAND LINE INTERFACE IP Interface Commands 35 1 ...
Page 362: ...OVERVIEW OF COMMAND LINE INTERFACE 17 14 ...
Page 494: ...USER AUTHENTICATION COMMANDS 21 48 ...
Page 514: ...CLIENT SECURITY COMMANDS 22 20 ...
Page 540: ...ACCESS CONTROL LIST COMMANDS 23 26 ...
Page 558: ...INTERFACE COMMANDS 24 18 ...
Page 576: ...MIRROR PORT COMMANDS 26 4 ...
Page 582: ...RATE LIMIT COMMANDS 27 6 ...
Page 616: ...SPANNING TREE COMMANDS 29 28 ...
Page 644: ...VLAN COMMANDS 30 28 ...
Page 664: ...CLASS OF SERVICE COMMANDS 31 20 ...
Page 678: ...QUALITY OF SERVICE COMMANDS 32 14 ...
Page 720: ...APPENDICES ...
Page 726: ...SOFTWARE SPECIFICATIONS A 6 ...
Page 730: ...TROUBLESHOOTING B 4 ...
Page 746: ...INDEX Index 6 ...
Page 747: ......