A
CCESS
C
ONTROL
L
IST
C
OMMANDS
4-123
Syntax
[
no
]
mask
[
protocol
]
{
any
|
host
|
source-bitmask
}
{
any
|
host
|
destination-bitmask
}
[
precedence
] [
tos
] [
dscp
]
[
source-port
[
port-bitmask
]] [
destination-port
[
port-bitmask]
]
[
control-flag
[
flag-bitmask
]]
•
protocol
– Check the protocol field.
•
any
– Any address will be matched.
•
host
– The address must be for a host device, not a subnetwork.
•
source-bitmask
– Source address of rule must match this bitmask.
• destination-bitmask
– Destination address of rule must match this
bitmask.
• precedence
– Check the IP precedence field.
•
tos
– Check the TOS field.
• dscp
– Check the DSCP field.
• source-port
– Check the protocol source port field.
• destination-port
– Check the protocol destination port field.
• port-bitmask
– Protocol port of rule must match this bitmask.
(Range: 0-65535)
• control-flag
– Check the field for control flags.
•
flag-bitmask
– Control flags of rule must match this bitmask.
(Range: 0-63)
Default Setting
None
Command Mode
IP Mask
Command Usage
• Packets crossing a port are checked against all the rules in the ACL until
a match is found. The order in which these packets are checked is
determined by the mask, and not the order in which the ACL rules were
entered.
Summary of Contents for 8612XL3
Page 2: ......
Page 26: ...CONTENTS xxvi ...
Page 40: ...INTRODUCTION 1 14 ...
Page 69: ...BASIC CONFIGURATION 3 15 ...
Page 175: ...PORT CONFIGURATION 3 121 ...
Page 337: ...IP ROUTING 3 283 Web Click Routing Protocol RIP Statistics ...
Page 379: ...MULTICAST ROUTING 3 325 Command Usage ...
Page 396: ...CONFIGURING THE SWITCH 3 342 ...
Page 582: ...COMMAND LINE INTERFACE 4 186 ...
Page 806: ... 224 Command Mode Privileged Exec Example Console clear vrrp 1 interface 1 counters Console ...
Page 826: ... 6 ...
Page 828: ...TROUBLESHOOTING B 2 ...
Page 838: ...GLOSSARY Glossary 10 ...
Page 845: ......