C
ONFIGURING
THE
S
WITCH
3-84
Web
– Configure the mask to match the required rules in the IP ingress or
egress ACLs. Set the mask to check for any source or destination address, a
specific host address, or an address range. Include other criteria to search
for in the rules, such as a protocol type or one of the service types. Or use
a bitmask to search for specific protocol port(s) or TCP control code(s).
Then click Add.
CLI
– This shows that the entries in the mask override the precedence in
which the rules are entered into the ACL. In the following example,
packets with the source address 10.1.1.1 are dropped because the “deny
Summary of Contents for 8612XL3
Page 2: ......
Page 26: ...CONTENTS xxvi ...
Page 40: ...INTRODUCTION 1 14 ...
Page 69: ...BASIC CONFIGURATION 3 15 ...
Page 175: ...PORT CONFIGURATION 3 121 ...
Page 337: ...IP ROUTING 3 283 Web Click Routing Protocol RIP Statistics ...
Page 379: ...MULTICAST ROUTING 3 325 Command Usage ...
Page 396: ...CONFIGURING THE SWITCH 3 342 ...
Page 582: ...COMMAND LINE INTERFACE 4 186 ...
Page 806: ... 224 Command Mode Privileged Exec Example Console clear vrrp 1 interface 1 counters Console ...
Page 826: ... 6 ...
Page 828: ...TROUBLESHOOTING B 2 ...
Page 838: ...GLOSSARY Glossary 10 ...
Page 845: ......