Access Control List Commands 4

access-list ip extended fragment-auto-mask

This command automatically creates extra masks to support fragmented ACL entries. Use the no form to disable this feature.

Syntax

[no] access-list ip extended fragment-auto-mask

Default Setting

Disabled

Command Mode

Global Configuration

Command Usage

If this feature is disabled, fragmented packets will not be matched by any ACL rule, and will be handled according to the default permit or deny rule.

Example

Console(config)#tacacs-list ip extended fragment-auto-mask Console(config)#

permit, deny (Standard ACL)

This command adds a rule to a Standard IP ACL. The rule sets a filter condition for packets emanating from the specified source. Use the no form to remove a rule.

Syntax

[no] {permit deny} {any source bitmask host source}

any – Any source IP address.

source – Source IP address.

bitmask – Decimal number representing the address bits to match.

host – Keyword followed by a specific IP address.

Default Setting

None

Command Mode

Standard ACL

Command Usage

New rules are appended to the end of the list.

Address bitmasks are similar to a subnet mask, containing four integers from 0 to 255, each separated by a period. The binary mask uses 1 bits to indicate “match” and 0 bits to indicate “ignore.” The bitmask is bitwise ANDed with the specified source IP address, and then compared with the address for each IP packet entering the port(s) to which this ACL has been assigned.

4-89