C
ONFIGURING
THE
S
WITCH
3-98
CLI
– This shows that the entries in the mask override the precedence in
which the rules are entered into the ACL. In the following example,
packets with the source address 10.1.1.1 are dropped because the “deny
10.1.1.1 255.255.255.255” rule has the higher precedence according the
“mask host any” entry.
Configuring a MAC ACL Mask
This mask defines the fields to check in the packet header.
Command Usage
You must configure a mask for an ACL rule before you can bind it to a
port.
Command Attributes
•
Source/Destination Address Type
– Use “Any” to match any
address, “Host” to specify the host address for a single node, or
“MAC” to specify a range of addresses. (Options: Any, Host, MAC;
Default: Any)
•
Source/Destination Bit Mask
– Address of rule must match this
bitmask.
•
VID Bit Mask
– VLAN ID of rule must match this bitmask.
•
Ethernet Type Bit Mask
– Ethernet type of rule must match this
bitmask.
•
Packet Format Bit Mask
– A packet format must be specified in the
rule.
Console(config)#access-list ip standard A2
4-117
Console(config-std-acl)#permit 10.1.1.0 255.255.255.0
4-118
Console(config-std-acl)#deny 10.1.1.1 255.255.255.255
Console(config-std-acl)#exit
Console(config)#access-list ip mask-precedence in
4-123
Console(config-ip-mask-acl)#mask host any
4-124
Console(config-ip-mask-acl)#mask 255.255.255.0 any
Console(config-ip-mask-acl)#
Summary of Contents for 8700S-130
Page 2: ......
Page 3: ......
Page 8: ...LIMITED WARRANTY iv ...
Page 56: ...INITIAL CONFIGURATION 2 18 ...
Page 189: ...PORT CONFIGURATION 3 133 Figure 3 61 Port Statistics continued ...
Page 566: ...COMMAND LINE INTERFACE 4 294 ...
Page 571: ...SOFTWARE SPECIFICATIONS A 5 Trap RFC 1215 UDP MIB RFC 2012 ...
Page 572: ...SOFTWARE SPECIFICATIONS A 6 ...
Page 576: ...TROUBLESHOOTING B 4 ...
Page 589: ......
Page 591: ...38 Tesla Irvine CA 92618 Phone 949 679 8000 ...
Page 592: ... 8 ...