Extreme Networks ExtremeWare XOS Guide Manual page 115

Concepts guide
Hide thumbs Also See for ExtremeWare XOS Guide:
Table of Contents

Advertisement

protocol
source-port 190;
destination-port
} then {
permit;
}
}
ACL rule entries are evaluated in order, from the beginning of the file to the end, as follows:
• If the packet matches all the match conditions, the action in the then statement is taken and
evaluation process terminates.
• If a rule entry does not contain any match condition, the packet is considered to match and the
action in the rule entry's then statement is taken and evaluation process terminates.
• If the packet matches all the match conditions, and if there is no action specified in the then
statement, the action permit is taken by default.
• If the packet does not match all the match conditions, the next rule entry in the ACL is evaluated.
• This process continues until either the packet matches all the match conditions in one of the
subsequent rule entries or there are no more entries.
• If a packet passes through all the rule entries in the ACL without matching any of them, it is
permitted.
Often an ACL will have a rule entry at the end of the ACL with no match conditions. This entry will
match any packets not otherwise processed, so that user can specify an action to overwrite the default
permit action.
Match Conditions. Multiple, single, or zero match conditions can be specified. If no match condition is
specified, all packets match the rule entry. Among the match conditions commonly used are:
• IP source address and mask
• IP destination address and mask
• TCP or UDP source port range
• TCP or UDP destination port range
Table 21describes all the possible match conditions.
Actions. The action is either
packet. The deny action drops the packet.
Action Modifier. The action modifier is
action modifier.
Table 21 lists the match conditions that can be used with ACLs. The conditions are case-insensitive; for
example, the match condition listed in the table as
Table 21 are five different data types used in matching packets. Table 22 lists the data types, and details
on using them.
ExtremeWare XOS 10.1 Concepts Guide
udp;
1200-1400;
,
, or no action specified. No action specified permits the
permit
deny
count
. The count action increments the counter named in the
can also be written as
TCP-flags
IP Access Lists (ACLs)
. Within
tcp-flags
115

Advertisement

Table of Contents
loading

This manual is also suitable for:

Extremeware xos 10.1

Table of Contents