MAC ACL
S
23-21
mask
(MAC ACL)
This command defines a mask for MAC ACLs. This mask defines the
fields to check in the packet header. Use the
no
form to remove a mask.
Syntax
[
no
]
mask
[
pktformat
]
{
any
|
host
|
source-bitmask
} {
any
|
host
|
destination-bitmask
}
[
vid
[
vid-bitmask
]] [
ethertype
[
ethertype-bitmask
]]
•
pktformat
– Check the packet format field. (If this keyword must
be used in the mask, the packet format must be specified in ACL rule
to match.)
•
any
– Any address will be matched.
•
host
– The address must be for a single node.
•
source-bitmask
– Source address of rule must match this bitmask.
• destination-bitmask
– Destination address of rule must match this
bitmask.
•
vid
– Check the VLAN ID field.
•
vid-bitmask
– VLAN ID of rule must match this bitmask.
•
ethertype
– Check the Ethernet type field.
•
ethertype-bitmask
– Ethernet type of rule must match this bitmask.
Default Setting
None
Command Mode
MAC Mask
Command Usage
• Up to seven masks can be assigned to an ingress or egress ACL.
• Packets crossing a port are checked against all the rules in the ACL
until a match is found. The order in which these packets are checked
is determined by the mask, and not the order in which the ACL rules
were entered.
• First create the required ACLs and inbound or outbound masks before
mapping an ACL to an interface.
Summary of Contents for 7824M/FSW - annexe 1
Page 2: ......
Page 24: ...TABLE OF CONTENTS xxiv ...
Page 28: ...TABLES xxviii ...
Page 32: ...FIGURES xxxii Figure 16 3 DNS Cache 16 7 ...
Page 34: ...GETTING STARTED ...
Page 46: ...SYSTEM DEFAULTS 1 12 ...
Page 62: ...SWITCH MANAGEMENT ...
Page 74: ...CONFIGURING THE SWITCH 3 12 ...
Page 112: ...BASIC MANAGEMENT TASKS 4 38 ...
Page 168: ...USER AUTHENTICATION 6 30 ...
Page 223: ...SHOWING PORT STATISTICS 9 33 Figure 9 12 Port Statistics ...
Page 230: ...ADDRESS TABLE SETTINGS 10 6 ...
Page 304: ...CLASS OF SERVICE 13 16 ...
Page 316: ...QUALITY OF SERVICE 14 12 ...
Page 338: ...MULTICAST FILTERING 15 22 ...
Page 346: ...DOMAIN NAME SERVICE 16 8 ...
Page 348: ...COMMAND LINE INTERFACE IP Interface Commands 35 1 ...
Page 362: ...OVERVIEW OF COMMAND LINE INTERFACE 17 14 ...
Page 494: ...USER AUTHENTICATION COMMANDS 21 48 ...
Page 514: ...CLIENT SECURITY COMMANDS 22 20 ...
Page 540: ...ACCESS CONTROL LIST COMMANDS 23 26 ...
Page 558: ...INTERFACE COMMANDS 24 18 ...
Page 576: ...MIRROR PORT COMMANDS 26 4 ...
Page 582: ...RATE LIMIT COMMANDS 27 6 ...
Page 616: ...SPANNING TREE COMMANDS 29 28 ...
Page 644: ...VLAN COMMANDS 30 28 ...
Page 664: ...CLASS OF SERVICE COMMANDS 31 20 ...
Page 678: ...QUALITY OF SERVICE COMMANDS 32 14 ...
Page 720: ...APPENDICES ...
Page 726: ...SOFTWARE SPECIFICATIONS A 6 ...
Page 730: ...TROUBLESHOOTING B 4 ...
Page 746: ...INDEX Index 6 ...
Page 747: ......