A
CCESS
C
ONTROL
L
ISTS
3-71
Web
– Click Security, ACL, Mask Configuration. Click Edit for one of the
basic mask types to open the configuration page.
Figure 3-31. Choosing ACL Types
CLI
– This example creates an IP ingress mask, and then adds two rules.
Each rule is checked in order of precedence to look for a match in the
ACL entries. The first entry matching a mask is applied to the inbound
packet.
Configuring an IP ACL Mask
This mask defines the fields to check in the IP header.
Command Usage
Masks that include an entry for a Layer 4 protocol source port or
destination port can only be applied to packets with a header length of
exactly five bytes.
Command Attributes
•
Src/Dst IP
– Specifies the source or destination IP address. Use
“Any” to match any address, “Host” to specify a host address (not a
Console(config)#access-list ip mask-precedence in
3-123
Console(config-ip-mask-acl)#mask host any
3-125
Console(config-ip-mask-acl)#mask 255.255.255.0 any
Console(config-ip-mask-acl)#
Summary of Contents for 8648T - annexe 1
Page 2: ......
Page 34: ...INTRODUCTION 1 10 ...
Page 48: ...INITIAL CONFIGURATION 2 14 ...
Page 159: ...PORT CONFIGURATION 3 111 Figure 3 48 Displaying Etherlike and RMON Statistics ...
Page 411: ...DNS COMMANDS 4 167 ...
Page 536: ...COMMAND LINE INTERFACE 4 291 ...
Page 542: ...TROUBLESHOOTING B 2 ...
Page 555: ......