Dell PowerConnect B-RX Configuration Manual page 611

Bigiron rx series configuration guide v02.8.00
Hide thumbs Also See for PowerConnect B-RX:
Table of Contents

Advertisement

<wildcard>
dst-mac<dst-mac> |
<mask>
fragment
non-fragment
first-fragment
fragment-offset <number>
NOTE: fragment, non-fragment, first-fragment, and fragment-offset may not be used together in the same ACL
log
Parameters to filter TCP or UDP packets
Use the parameters below if you want to filter traffic with the TCP or UDP packets. These
parameters apply only if you entered tcp or udp for the <ip-protocol> parameter. For example, if
you are configuring an entry for HTTP, specify tcp eq http.
BigIron RX Series Configuration Guide
53-1002253-01
Specifies the portion of the source IP host address to match against. The
<wildcard> is a four-part value in dotted-decimal notation (IP address format)
consisting of ones and zeros. Zeros in the mask mean the packet's source address
must match the <source-ip>. Ones mean any value matches. For example, the
<source-ip> and <wildcard> values 209.157.22.26 0.0.0.255 mean that all hosts
in the Class C subnet 209.157.22.x match the policy.
If you prefer to specify the wildcard (mask value) in Classless Interdomain Routing
(CIDR) format, you can enter a forward slash after the IP address, then enter the
number of significant bits in the mask. For example, you can enter the CIDR
equivalent of "209.157.22.26 0.0.0.255" as "209.157.22.26/24". The CLI
automatically converts the CIDR number into the appropriate ACL mask (where
zeros instead of ones are the significant bits) and changes the non-significant
portion of the IP address into zeros. For example, if you specify 209.157.22.26/24
or 209.157.22.26 0.0.0.255, then save the changes to the startup-config file, the
value appears as 209.157.22.0/24 (if you have enabled display of subnet lengths)
or 209.157.22.0 0.0.0.255 in the startup-config file. The IP subnet masks in CIDR
format is saved in the file in "/<mask-bits>" format.
If you use the CIDR format, the ACL entries appear in this format in the
running-config and startup-config files, but are shown with subnet mask in the
display produced by the show access-list command.
Specify the destination MAC host for the policy. If you want the policy to match on
all destination addresses, enter any.
Enter this keyword if you want to filter fragmented packets. Refer to
filtering of fragmented or non-fragmented packets"
NOTE: The fragmented and non-fragmented parameters cannot be used together
Enter this keyword if you want to filter non-fragmented packets. Refer to
ACL filtering of fragmented or non-fragmented packets"
NOTE: The fragmented and non-fragmented parameters cannot be used together
Enter this keyword if you want to filter only the first-fragmented packets. Refer to
"Enabling ACL filtering of fragmented or non-fragmented packets"
Enter this parameter if you want to filter a specific fragmented packets. Enter a
value from 0 – 8191. Refer to
non-fragmented packets"
statement.
Add this parameter to the end of an ACL statement to enable the generation of
SNMP traps and Syslog messages for packets denied by the ACL.You can enable
logging on ACLs and filters that support logging even when the ACLs and filters are
already in use. To do so, re-enter the ACL or filter command and add the log
parameter to the end of the ACL or filter. The software replaces the ACL or filter
command with the new one. The new ACL or filter, with logging enabled, takes
effect immediately.
NOTE: Logging must be enable on the interface to which the ACL is bound before
Configuring numbered and named ACLs
in an ACL entry.
in an ACL entry.
"Enabling ACL filtering of fragmented or
on page 568.
SNMP traps and Syslog messages can be generated, even if the log
parameter is entered. Refer to
"Enabling ACL
on page 568.
on page 568.
on page 568.
"ACL logging"
on page 555.
21
"Enabling
535

Advertisement

Table of Contents
loading

This manual is also suitable for:

Bigiron rx series

Table of Contents