A
CCESS
C
ONTROL
L
ISTS
3-97
specify a host address (not a subnet), or “IP” to specify a range of
addresses. (Options: Any, Host, IP; Default: Any)
•
Source/Destination Subnet Mask
– Source or destination address
of rule must match this bitmask. (See the description for SubMask on
page 3-89.)
•
Protocol Mask
– Check the protocol field.
•
Service Type Mask
– Check the rule for the specified priority type.
(Options: Precedence, TOS, DSCP; Default: TOS)
•
Source/Destination Port
Bit Mask
– Protocol port of rule must
match this bitmask. (Range: 0-65535)
•
Control Code Bit Mask
– Control flags of rule must match this
bitmask. (Range: 0-63)
Web
– Configure the mask to match the required rules in the IP ingress or
egress ACLs. Set the mask to check for any source or destination address, a
specific host address, or an address range. Include other criteria to search
for in the rules, such as a protocol type or one of the service types. Or use
a bitmask to search for specific protocol port(s) or TCP control code(s).
Then click Add.
Figure 3-46 ACL Mask Configuration - IP
Содержание 8700S-130
Страница 2: ......
Страница 3: ......
Страница 8: ...LIMITED WARRANTY iv ...
Страница 56: ...INITIAL CONFIGURATION 2 18 ...
Страница 189: ...PORT CONFIGURATION 3 133 Figure 3 61 Port Statistics continued ...
Страница 566: ...COMMAND LINE INTERFACE 4 294 ...
Страница 571: ...SOFTWARE SPECIFICATIONS A 5 Trap RFC 1215 UDP MIB RFC 2012 ...
Страница 572: ...SOFTWARE SPECIFICATIONS A 6 ...
Страница 576: ...TROUBLESHOOTING B 4 ...
Страница 589: ......
Страница 591: ...38 Tesla Irvine CA 92618 Phone 949 679 8000 ...
Страница 592: ... 8 ...