C
ONFIGURING
A
CCESS
C
ONTROL
L
ISTS
8-13
Web – Configure the mask to match the req uired rules in the IP ingress or
egress ACLs. Set the mask to check for any source or destination address, a
specific host address, or an address range. Include other criteria to search
for in the rules, such as a protocol type or one of the service types. Or use
a bitmask to search for specific protocol port(s) or TCP contr ol code(s).
Then click Add.
Figure 8-6 ACL Mask Configuration - IP