Access Control Lists (ACL) |
231
The C-Series and S-Series cannot count both packets and bytes, so when you enter the
count byte
options, only bytes are incremented.
The
monitor
option is relevant in the context of flow-based monitoring only. See the
Most ACL rules require one entry in the CAM. However, rules with TCP and UDP port operators (
gt
,
lt
,
range
) may require more than one entry. The range of ports is configured in the CAM based on bit
mask boundaries; the space required depends on exactly what ports are included in the range.
For example, an ACL rule with TCP port range 4000 - 8000 will use 8 entries in the CAM:
But an ACL rule with TCP port lt 1023 takes only one entry in the CAM:
Related
Commands
ip access-list extended
c e s
Name (or select) an extended IP access list (IP ACL) based on IP addresses or protocols.
Syntax
ip access-list extended access-list-name
To delete an access list, use the
no
ip
access-list
extended
access-list-name
command.
Parameters
Defaults
All access lists contain an implicit “deny any”; that is, if no match occurs, the packet is dropped.
Command Modes
CONFIGURATION
Note:
When ACL logging and byte counters are configured simultaneously, byte counters
may display an incorrect value. Configure packet counters with logging instead.
Rule# Data Mask From To #Covered
1 0000111110100000 1111111111100000 4000 4031 32
2 0000111111000000 1111111111000000 4032 4095 64
3 0001000000000000 1111100000000000 4096 6143 2048
4 0001100000000000 1111110000000000 6144 7167 1024
5 0001110000000000 1111111000000000 7168 7679 512
6 0001111000000000 1111111100000000 7680 7935 256
7 0001111100000000 1111111111000000 7936 7999 64
8 0001111101000000 1111111111111111 8000 8000 1
Total Ports: 4001
Rule# Data Mask From To #Covered
1 0000000000000000 1111110000000000 0 1023 1024
Total Ports: 1024
Assign a deny filter for IP traffic.
Assign a deny filter for TCP traffic.
access-list-name
Enter a string up to 140 characters long as the access list name.
Содержание Force10 TeraScale C Series
Страница 1: ...FTOS Command Line Reference Guide FTOS 8 4 2 7 E Series TeraScale C Series S Series S50 S25 ...
Страница 164: ...164 Control and Monitoring w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 176: ...176 802 1ag w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 188: ...188 802 3ah w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 204: ...204 802 1X w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 294: ...294 Access Control Lists ACL w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 428: ...428 Border Gateway Protocol IPv4 BGPv4 w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 456: ...456 Configuration Rollback w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 472: ...472 Dynamic Host Configuration Protocol DHCP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 484: ...484 Far End Failure Detection FEFD w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 682: ...682 IPv4 Routing w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 732: ...732 IPv6 Basics w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 896: ...896 Layer 2 w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 914: ...914 Link Layer Detection Protocol LLDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 926: ...926 Multicast Listener Discovery MLD w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 952: ...952 Multiple Spanning Tree Protocol MSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 976: ...976 Multicast w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 984: ...984 Neighbor Discovery Protocol NDP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1094: ...1094 Policy based Routing PBR w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1130: ...1130 PIM Sparse Mode PIM SM w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1164: ...1164 Private VLAN PVLAN w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1276: ...1276 Rapid Spanning Tree Protocol RSTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1342: ...1342 Service Provider Bridging w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1354: ...1354 sFlow w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1428: ...1428 Spanning Tree Protocol STP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1444: ...1444 Time and Network Time Protocol NTP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1464: ...1464 VLAN Stacking w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1494: ...1494 Virtual Router Redundancy Protocol VRRP w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1534: ...1534 C Series Diagnostics and Debugging w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1574: ...1574 E Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1592: ...1592 S Series Debugging and Diagnostics w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1622: ...1622 Index w w w d e l l c o m s u p p o r t d e l l c o m ...
Страница 1640: ...1640 Command Index w w w d e l l c o m s u p p o r t d e l l c o m ...