Cisco OL-4015-08 User Manual page 516

Cisco router and security device manager user's guide
Table of Contents

Advertisement

Rules Windows
Source Host/Network
Destination Host/Network
Cisco Router and Security Device Manager Version 2.2 User's Guide
24-14
What Permit and Deny do depends on the type of rule in which they are used. In
SDM, extended rule entries can be used in access rules, NAT rules, IPSec rules,
and access lists associated with
Deny Keywords
to learn more about the action of Permit and the action of Deny
in the context of a specific type of rule.
The source IP address criteria that the traffic must match. The fields in this area
of the window change, based on the value of the Type field.
Type
Select one of the following:
A specific IP address. This can be a network address, or the address of a
specific host.
A host name.
Any IP address.
IP Address
If you selected A specific IP address, enter the
address you enter is a network address, enter a
of the network address that must be matched.
Mask
If you selected A specific IP address, either select the wildcard mask from this
list, or enter a custom wildcard mask. A binary 0 in a wildcard mask means that
the corresponding bit in the packet's IP address must match exactly. A binary 1 in
a wildcard mask means that the corresponding bit in the packet's IP address need
not match.
Hostname
If you selected A host name in the Type field, enter the name of the host.
The source IP address criteria that the traffic must match. The fields in this area
of the window change, based on the value of the Type field.
route
maps. Click
Meanings of the Permit and
IP address
wildcard mask
Chapter 24
ACL Editor
in this field. If the
to specify the parts
OL-4015-08

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sdm 2.2

Table of Contents