C
ONFIGURING
THE
S
WITCH
3-98
CLI
– This shows that the entries in the mask override the precedence in
which the rules are entered into the ACL. In the following example,
packets with the source address 10.1.1.1 are dropped because the “deny
10.1.1.1 255.255.255.255” rule has the higher precedence according the
“mask host any” entry.
Configuring a MAC ACL Mask
This mask defines the fields to check in the packet header.
Command Usage
You must configure a mask for an ACL rule before you can bind it to a
port.
Command Attributes
•
Source/Destination Address Type
– Use “Any” to match any
address, “Host” to specify the host address for a single node, or
“MAC” to specify a range of addresses. (Options: Any, Host, MAC;
Default: Any)
•
Source/Destination Bit Mask
– Address of rule must match this
bitmask.
•
VID Bit Mask
– VLAN ID of rule must match this bitmask.
•
Ethernet Type Bit Mask
– Ethernet type of rule must match this
bitmask.
•
Packet Format Bit Mask
– A packet format must be specified in the
rule.
Console(config)#access-list ip standard A2
4-117
Console(config-std-acl)#permit 10.1.1.0 255.255.255.0
4-118
Console(config-std-acl)#deny 10.1.1.1 255.255.255.255
Console(config-std-acl)#exit
Console(config)#access-list ip mask-precedence in
4-123
Console(config-ip-mask-acl)#mask host any
4-124
Console(config-ip-mask-acl)#mask 255.255.255.0 any
Console(config-ip-mask-acl)#
Содержание 8700S-130
Страница 2: ......
Страница 3: ......
Страница 8: ...LIMITED WARRANTY iv ...
Страница 56: ...INITIAL CONFIGURATION 2 18 ...
Страница 189: ...PORT CONFIGURATION 3 133 Figure 3 61 Port Statistics continued ...
Страница 566: ...COMMAND LINE INTERFACE 4 294 ...
Страница 571: ...SOFTWARE SPECIFICATIONS A 5 Trap RFC 1215 UDP MIB RFC 2012 ...
Страница 572: ...SOFTWARE SPECIFICATIONS A 6 ...
Страница 576: ...TROUBLESHOOTING B 4 ...
Страница 589: ......
Страница 591: ...38 Tesla Irvine CA 92618 Phone 949 679 8000 ...
Страница 592: ... 8 ...