A
CCESS
C
ONTROL
L
ISTS
3-115
specify a host address (not a subnet), or “IP” to specify a range of
addresses. (Options: Any, Host, IP; Default: Any)
•
Source/Destination Subnet Mask
– Source or destination address
of rule must match this bitmask. (See the description for SubMask on
page 3-107.)
•
Protocol Mask
– Check the protocol field.
•
Service Type
Mask
– Check the rule for the specified priority type.
(Options: Precedence, TOS, DSCP; Default: TOS)
•
Source/Destination Port
Bit Mask
– Protocol port of rule must
match this bitmask. (Range: 0-65535)
•
Control Code Bit Mask
– Control flags of rule must match this
bitmask. (Range: 0-63)
Содержание 8708L2
Страница 2: ......
Страница 24: ...TABLES xxiv ...
Страница 28: ...FIGURES xxviii ...
Страница 213: ...SPANNING TREE ALGORITHM CONFIGURATION 3 161 Web Click Spanning Tree STA Information Figure 3 66 STA Information ...
Страница 290: ...CONFIGURING THE SWITCH 3 238 ...
Страница 584: ...COMMAND LINE INTERFACE 4 294 ...
Страница 592: ...TROUBLESHOOTING B 4 ...
Страница 605: ......