Chapter 4 Service Configuration
4.13.66 egress-acl hybrid rule type-ip-protocol
Purpose
This command sets the rule that the hybrid egress ACL matches the packets with
IPv4-specified field.
Command Mode
Hybrid egress ACL configuration mode
Syntax
rule
<
1-500
>{
permit
|
deny
}<
ip-protocol
>{<
source-ipaddr
><
sip-mask
>|
any
}{<
destination-ipad
dr
><
dip-mask
>|
any
}[
dscp
<
0-63
>][
fragment
][
cos
<
0-7
>][<
vlan-id
>[<
vlan-mask
>]][<
source-m
ac
><
smac-mask
>|
any
][<
dest-mac
><
dmac-mask
>|
any
]
Parameter Description
Parameter
Description
<
1-500
>
Rule number.
permit
If the condition matches, access is permitted.
deny
If the condition matches, access is denied.
<
ip-protocol
>
This rule is only valid for messages with the specified IP protocol
field. Ignore this rule for other messages. The range of IP protocol
field value is 0 to 255.
<
source-ipaddr
>
IP address of the source network or host transmitting packets. It is
a 32-bit IP address expressed in dotted decimal notation.
<
sip-mask
>
Source mask used for sources. It is a 32-bit IP address expressed
in dotted decimal notation.
any
(first)
The any keyword is used as the abbreviation of the source 0.0.0.0
and the source mask 0.0.0.0.
<
destination-ipaddr
>
Destination network or host of the transmitted packet. It is a 32-bit
IP address expressed in dotted decimal notation.
<
dip-mask
>
Destination mask used for destination. It is a 32-bit IP address
expressed in dotted decimal notation.
any
(second)
The any keyword is used as the abbreviation of the destination
0.0.0.0 and the destination mask 0.0.0.0
dscp
<
0-63
>
This rule is only valid for the message with the specified DSCP
value. Ignore this rule for other messages. The range of DSCP
value is 0 to 63.
fragment
This rule is only valid for fragment messages. For non-fragment
messages, this rule is ignored.
4-277
SJ-20130731155059-003|2013-11-27 (R1.0)
ZTE Proprietary and Confidential