ACCESS CONTROL LISTS

Web – Click Security, ACL, Mask Configuration. Click Edit for one of the basic mask types to open the configuration page.

Figure 3-31. Choosing ACL Types

CLI – This example creates an IP ingress mask, and then adds two rules. Each rule is checked in order of precedence to look for a match in the ACL entries. The first entry matching a mask is applied to the inbound packet.

Console(config)#access-list ip mask-precedence

in

3-123

Console(config-ip-mask-acl)#mask host any

 

3-125

Console(config-ip-mask-acl)#mask 255.255.255.0

any

 

Console(config-ip-mask-acl)#

 

 

 

 

 

Configuring an IP ACL Mask

This mask defines the fields to check in the IP header.

Command Usage

Masks that include an entry for a Layer 4 protocol source port or destination port can only be applied to packets with a header length of exactly five bytes.

Command Attributes

Src/Dst IP – Specifies the source or destination IP address. Use “Any” to match any address, “Host” to specify a host address (not a

3-71

Page 119
Image 119
SMC Networks SMC8624/48T manual Configuring an IP ACL Mask, This mask defines the fields to check in the IP header