C
ONFIGURING
THE
S
WITCH
3-96
Web
– Click Security, ACL, Mask Configuration. Click Edit for one of the
basic mask types to open the configuration page.
Figure 3-45 Selecting ACL Mask Types
CLI
– This example creates an IP ingress mask, and then adds two rules.
Each rule is checked in order of precedence to look for a match in the
ACL entries. The first entry matching a mask is applied to the inbound
packet.
Configuring an IP ACL Mask
This mask defines the fields to check in the IP header.
Command Usage
Masks that include an entry for a Layer 4 protocol source port or
destination port can only be applied to packets with a header length of
exactly five bytes.
Command Attributes
•
Source/Destination Address Type
– Specifies the source or
destination IP address. Use “Any” to match any address, “Host” to
Console(config)#access-list ip mask-precedence in
4-123
Console(config-ip-mask-acl)#mask host any
4-124
Console(config-ip-mask-acl)#mask 255.255.255.0 any
Console(config-ip-mask-acl)#
Summary of Contents for 8700S-130
Page 2: ......
Page 3: ......
Page 8: ...LIMITED WARRANTY iv ...
Page 56: ...INITIAL CONFIGURATION 2 18 ...
Page 189: ...PORT CONFIGURATION 3 133 Figure 3 61 Port Statistics continued ...
Page 566: ...COMMAND LINE INTERFACE 4 294 ...
Page 571: ...SOFTWARE SPECIFICATIONS A 5 Trap RFC 1215 UDP MIB RFC 2012 ...
Page 572: ...SOFTWARE SPECIFICATIONS A 6 ...
Page 576: ...TROUBLESHOOTING B 4 ...
Page 589: ......
Page 591: ...38 Tesla Irvine CA 92618 Phone 949 679 8000 ...
Page 592: ... 8 ...