Extreme Networks Summit 300-48 Software User's Manual page 154

Extreme summit 300-48: software user guide
Hide thumbs Also See for Summit 300-48:
Table of Contents

Advertisement

Access Policies
Table 63: Access Control List Configuration Commands (continued)
Command
create access-mask <access-mask name>
{dest-mac}
{source-mac}
{vlan }
{ethertype}
{tos | code-point}
{ipprotocol}
{dest-ip /<mask length>} {dest-L4port}
{source-ip /<mask length>}
{source-L4port | {icmp-type} {icmp-code}}
{permit-established}
{egressport}
{ports}
{precedence <number>}
154
Description
Creates an access mask. The mask specifies
which packet fields to examine. Options include:
• <access-mask name> — Specifies the
access mask name. The access mask name
can be between 1 and 31 characters.
• dest-mac — Specifies the destination MAC
address field.
• source-mac — Specifies the source MAC
address field.
• vlan — Specifies the VLANid field.
• ethertype — Specifies the Ethertype field.
• tos — Specifies the IP precedence field.
• code-point — Specifies the DiffServ code
point field.
• ipprotocol — Specifies the IP protocol
field.
• dest-ip — Specifies the IP destination field
and subnet mask. You must supply the
subnet mask.
• dest-L4port — Specifies the destination
port field.
• source-ip — Specifies the IP source
address field and subnet mask. You must
supply the subnet mask.
• source-L4port — Specifies the source
port field.
• icmp-type — Specify the ICMP type field.
• icmp-code — Specify the ICMP code field.
• permit-established — Specifies the TCP
SYN/ACK bit fields.
• egressport — Specify the egress port
• ports — Specifies the ingress port(s) on
which this rule is applied.
• precedence — Specifies the access mask
precedence number. The range is 1 to
25,600.
Summit 300-48 Switch Software User Guide

Advertisement

Table of Contents
loading

Table of Contents