Figure 3-47 Configuring An Ip Based Acl - SMC Networks SMC TigerStack III SMC6824M Management Manual

24-port fast ethernet switch
Hide thumbs Also See for SMC TigerStack III SMC6824M:
Table of Contents

Advertisement

• Source/Destination Subnet Mask – Subnet mask for source or
destination address. (See the description for SubMask on page 3-100.)
• Protocol Bitmask – Check the protocol field.
• Service Type Mask – Check the rule for the specified priority type.
(Options: Precedence, TOS, DSCP; Default: TOS)
• Source/Destination Port Bitmask – Protocol port of rule must match
this bitmask. (Range: 0-65535)
• Control Code Bitmask – Control flags of rule must match this bitmask.
(Range: 0-63)
Web – Configure the mask to match the required rules in the IP ingress or
egress ACLs. Set the mask to check for any source or destination address, a
specific host address, or an address range. Include other criteria to search
for in the rules, such as a protocol type or one of the service types. Or use
a bitmask to search for specific protocol port(s) or TCP control code(s).
Then click Add.

Figure 3-47 Configuring an IP based ACL

A
C
CCESS
ONTROL
L
ISTS
3-109

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents