C
OMMAND
L
INE
I
NTERFACE
4-126
Command Mode
IP Mask
Command Usage
• Packets crossing a port are checked against all the rules in the ACL
until a match is found. The order in which these packets are checked
is determined by the mask, and not the order in which the ACL rules
were entered.
• First create the required ACLs and ingress or egress masks before
mapping an ACL to an interface.
• If you enter
dscp
, you cannot enter
tos
or
precedence
. You can enter
both
tos
and
precedence
without
dscp
.
• Masks that include an entry for a Layer 4 protocol source port or
destination port can only be applied to packets with a header length of
exactly five bytes.
Example
This example creates an IP ingress mask with two rules. Each rule is
checked in order of precedence to look for a match in the ACL entries.
The first entry matching a mask is applied to the inbound packet.
This shows that the entries in the mask override the precedence in which
the rules are entered into the ACL. In the following example, packets with
the source address 10.1.1.1 are dropped because the “deny 10.1.1.1
255.255.255.255” rule has the higher precedence according the “mask host
any” entry.
Console(config)#access-list ip mask-precedence in
Console(config-ip-mask-acl)#mask host any
Console(config-ip-mask-acl)#mask 255.255.255.0 any
Console(config-ip-mask-acl)#
Console(config)#access-list ip standard A2
Console(config-std-acl)#permit 10.1.1.0 255.255.255.0
Console(config-std-acl)#deny 10.1.1.1 255.255.255.255
Console(config-std-acl)#exit
Console(config)#access-list ip mask-precedence in
Console(config-ip-mask-acl)#mask host any
Console(config-ip-mask-acl)#mask 255.255.255.0
Console(config-ip-mask-acl)#
Summary of Contents for 8612T2 - annexe 1
Page 2: ......
Page 23: ...TABLES xix ...
Page 36: ...INTRODUCTION 1 10 ...
Page 50: ...INITIAL CONFIGURATION 2 14 ...
Page 161: ...PORT CONFIGURATION 3 111 Figure 3 48 Port Statistics Continued ...
Page 248: ...CONFIGURING THE SWITCH 3 198 ...
Page 542: ...TROUBLESHOOTING B 2 ...
Page 555: ......