C
ONFIGURING
THE
S
WITCH
3-82
Web
– Click Security, ACL, ACL Mask Configuration. Click Edit for one
of the basic mask types to open the configuration page.
CLI
– This example creates an IP ingress mask, and then adds two rules.
Each rule is checked in order of precedence to look for a match in the
ACL entries. The first entry matching a mask is applied to the inbound
packet.
Configuring an IP ACL Mask
This mask defines the fields to check in the IP header.
Command Usage
•
Masks that include an entry for a Layer 4 protocol source port or
destination port can only be applied to packets with a header length of
exactly five bytes.
Command Attributes
•
Src/Dst IP
– Specifies the source or destination IP address. Use
“Any” to match any address, “Host” to specify a host address (not a
subnet), or “IP” to specify a range of addresses. (Options: Any, Host,
IP; Default: Any)
•
Src/Dst IP Bitmask
– Source or destination address of rule must
Console(config)#access-list ip mask-precedence in
3-121
Console(config-ip-mask-acl)#mask host any
3-122
Console(config-ip-mask-acl)#mask 255.255.255.0 any
Console(config-ip-mask-acl)#
Summary of Contents for 8612XL3
Page 2: ......
Page 26: ...CONTENTS xxvi ...
Page 40: ...INTRODUCTION 1 14 ...
Page 69: ...BASIC CONFIGURATION 3 15 ...
Page 175: ...PORT CONFIGURATION 3 121 ...
Page 337: ...IP ROUTING 3 283 Web Click Routing Protocol RIP Statistics ...
Page 379: ...MULTICAST ROUTING 3 325 Command Usage ...
Page 396: ...CONFIGURING THE SWITCH 3 342 ...
Page 582: ...COMMAND LINE INTERFACE 4 186 ...
Page 806: ... 224 Command Mode Privileged Exec Example Console clear vrrp 1 interface 1 counters Console ...
Page 826: ... 6 ...
Page 828: ...TROUBLESHOOTING B 2 ...
Page 838: ...GLOSSARY Glossary 10 ...
Page 845: ......