Configuring ACL Introduction
6-37
Software Reference for SwitchBlade x3100 Series Switches (Access and Security)
6.4.5 Access Command List
Ta b l e 6- 6 lists the commands that are used for ACL.
Ta b l e 6- 7 lists the ACL parameters that are used with these commands.
TABLE 6-6 Access List Commands
Commands
ADD ACCESSLIST INTERFACE
ADD ACCESSLIST RULE
CREATE ACCESSLIST
DELETE ACCESSLIST RULE
DELETE ACCESSLIST INTERFACE
DESTROY ACCESSLIST
RESET ACCESSLIST
SET ACCESSLIST RULE
SHOW ACCESSLIST
TABLE 6-7 Access List associated command parameters
Parameter Description
accesslistname An arbitrary name. The name of the ACCESSLIST being affected.
RULE The RULE key word indicates the following arguments are to form a single
rule entry on the specified access list. A RULE must be marked with either
the PERMIT or DENY action. PERMIT indicates to allow packets matching
the accompanying match arguments to pass into the Allied Telesis shelf.
DENY prevents matching traffic from entering the shelf.
MACDEST MAC destination address to match (e.g. 00:0C:25:00:13:8C)
MACSOURCE MAC source address to match (e.g. 00:0C:25:00:13:8C)
PROTOCOL The value of the Layer 2 protocol field to match. The command will accept
IPV4, IPV6, or a numeric value.