H3C IE4300 Command Reference Manual page 1694

Industrial switch series
Hide thumbs Also See for IE4300:
Table of Contents

Advertisement

Default
No IPv4 basic ACL rules exist.
Views
IPv4 basic ACL view
Predefined user roles
network-admin
Parameters
rule-id
: Specifies a rule ID in the range of 0 to 65534. If you do not specify a rule ID when creating
an ACL rule, the system automatically assigns it a rule ID. This rule ID is the nearest higher multiple
of the numbering step to the current highest rule ID, starting from the start rule ID. For example, if the
rule numbering step is 5 and the current highest rule ID is 28, the rule is numbered 30.
: Denies matching packets.
deny
: Allows matching packets to pass.
permit
counting
: Enables rule match counting in software. If you do not specify this keyword, matches for
the rule are not counted in software.
: Applies the rule only to fragments. If you do not specify this keyword, the rule applies to
fragment
both fragments and non-fragments.
: Logs the number of matching packets. This feature is available only when the application
logging
module (for example, packet filtering) that uses the ACL supports the logging feature.
source { source-address source-wildcard | any }
source-address
wildcard mask in dotted decimal notation. A wildcard mask of zeros represents a host address. The
keyword represents any source IP address.
any
time-range time-range-name
argument is a case-insensitive string of 1 to 32 characters. It must start with an English letter. If the
time range is not configured, the system creates the rule. However, the rule using the time range can
take effect only after you configure the time range. For more information about time range, see ACL
and QoS Configuration Guide.
vpn-instance vpn-instance-name
vpn-instance-name
to filter packets, if you do not specify a VPN instance, the rule applies to both non-VPN packets and
VPN packets. For an ACL used by other features, if you do not specify a VPN instance, the
implementation varies by feature. For more information, see the configuration guide of the feature.
Usage guidelines
Within an ACL, the permit or deny statement of each rule must be unique. If the rule you are creating
or editing has the same deny or permit statement as another rule in the ACL, the rule will not be
created or changed.
You can edit ACL rules only when the match order is
The
counting
hardware-count
hardware for all rules in an ACL.
To view the existing IPv4 basic and advanced ACL rules, use the
The
undo rule rule-id
specify optional parameters, the
the rule.
and
source-wildcard
: Specifies a time range for the rule. The
argument is a case-sensitive string of 1 to 31 characters. For an ACL used
keyword in this command enables match counting specific to rules, and the
keyword in the
packet-filter
command without any optional parameters deletes an entire rule. If you
undo rule rule-id
: Matches a source address. The
arguments specify a source IP address and a
: Applies the rule to an MPLS L3VPN instance. The
.
config
command enables match counting in
command deletes the specified attributes for
25
time-range-name
display acl all
command.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ie4300-mIe4320

Table of Contents