A
CCESS
C
ONTROL
L
ISTS
3-73
Web
– Configure the mask to match the required rules in the IP ingress or
egress ACLs. Set the mask to check for any source or destination address, a
specific host address, or an address range. Include other criteria to search
for in the rules, such as a protocol type or one of the service types. Or use
a bitmask to search for specific protocol port(s) or TCP control code(s).
Then click Add.
Figure 3-32. Configuring an IP based ACL
CLI
– This shows that the entries in the mask override the precedence in
which the rules are entered into the ACL. In the following example,
packets with the source address 10.1.1.1 are dropped because the “deny
10.1.1.1 255.255.255.255” rule has the higher precedence according the
“mask host any” entry.
Содержание 8648T - annexe 1
Страница 2: ......
Страница 34: ...INTRODUCTION 1 10 ...
Страница 48: ...INITIAL CONFIGURATION 2 14 ...
Страница 159: ...PORT CONFIGURATION 3 111 Figure 3 48 Displaying Etherlike and RMON Statistics ...
Страница 411: ...DNS COMMANDS 4 167 ...
Страница 536: ...COMMAND LINE INTERFACE 4 291 ...
Страница 542: ...TROUBLESHOOTING B 2 ...
Страница 555: ......