C
ONFIGURING
THE
S
WITCH
3-84
Web – Configure the mask to match the req uired rules in the IP ingress or
egress ACLs. Set the mask to check for any source or destination address, a
specific host address, or an address range. Include other criteria to search
for in the rules, such as a protocol type or one of the service types. Or use
a bitmask to search for specific protocol port(s) or TCP contr ol code(s).
Then click Add.
CLI – This shows that the entries in the mask override the precedence in
which the rules are entered into the ACL. In the following exa mple,
packets with the source address 10.1.1.1 are dropped because the “deny