EasyManuals Logo

Edge-Core ES3528-WDM User Manual

Edge-Core ES3528-WDM
556 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #139 background imageLoading...
Page #139 background image
Configuring Access Control Lists
8-11
8
Web – Configure the mask to match the required rules in the IP ingress or egress
ACLs. Set the mask to check for any source or destination address, a specific host
address, or an address range. Include other criteria to search for in the rules, such
as a protocol type or one of the service types. Or use a bitmask to search for specific
protocol port(s) or TCP control code(s). Then click Add.
Figure 8-6 ACL Mask Configuration - IP
CLI – This shows that the entries in the mask override the precedence in which the
rules are entered into the ACL. In the following example, packets with the source
address 10.1.1.1 are dropped because the “deny 10.1.1.1 255.255.255.255” rule
has the higher precedence according the “mask host any” entry.
Console(config)#access-list ip standard A2 23-2
Console(config-std-acl)#permit 10.1.1.0 255.255.255.0 23-2
Console(config-std-acl)#deny 10.1.1.1 255.255.255.255
Console(config-std-acl)#exit
Console(config)#access-list ip mask-precedence in 23-6
Console(config-ip-mask-acl)#mask host any 23-6
Console(config-ip-mask-acl)#mask 255.255.255.0 any
Console(config-ip-mask-acl)#

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Edge-Core ES3528-WDM and is the answer not in the manual?

Edge-Core ES3528-WDM Specifications

General IconGeneral
BrandEdge-Core
ModelES3528-WDM
CategorySwitch
LanguageEnglish

Related product manuals