Quanta Computer QuantaMesh User Manual page 588

Layer 2/3/4 managed switch
Table of Contents

Advertisement

UANTA COMPUTER INC.
5.21.2.5 access-list
This command creates an Access Control List (ACL) that is identified by the parameter.
Syntax
access-list {(<1-99> {deny | permit} {every | <srcip> <srcm ask>}) | ( {<100-199> {deny | permit} {every
| {{eigrp| gre | icmp | igmp | ip | ipinip | ospf | pim | tcp | udp | <number>} {srcip srcmask | any | host
srcip} [{range {portkey|startport} {portkey|endport} | {eq | neq | lt | gt} {portkey|0-65535} {dstip dstmask |
any | host dstip} [{range {portkey|startport} {portkey|endport} | {eq | neq | lt | gt} {portkey|0-65535}] [flag
[+fin | -fin] [+syn | -syn] [+rst | -rst] [+psh | -psh] [+ack | -ack] [+urg | -urg] [established]] {[fragments]
[precedence <precedence>] | [tos <tos> <tosmask>] | [dscp <dscp>] [log] [time-range
time-range-name] [assign-queue <queue-id>] [{mirror | redirect} {<slot/port> | port-channel
<portchannel-id>}] [{redirectExtAgent <agent-id>}] [{rate-limit rate burst-size}] [<rule-id>]}}}})}
<accesslistnumber> - The ACL number is an integer from 1 to 199. The range 1 to 99 is for the
normal ACL List and 100 to 199 is for the extended ACL List.
permit or deny - The ACL rule is created with two options. The protocol to filter for an ACL rule is
specified by giving the protocol to be used like icmp ,igmp ,ip ,tcp, udp. The command specifies a
source ip address and source mask for match condition of the ACL rule specified by the srcip and
srcmask parameters. The source layer 4 port match condition for the ACL rule is specified by the
port key parameter.
<portkey> - uses a single keyword notation and currently has the values of domain, echo, ftp,
ftpdata, http, smtp, snmp, telnet, tftp, and www. Each of these values translates into its
equivalent port number, which is used as both the start and end of a port range. The command
specifies a destination ip address and destination mask for match condition of the ACL rule specified
by the dstip and dstmask parameters. The command specifies the TOS for an ACL rule depending
on a match of precedence or DSCP values using the parameters tos, tosmask, dscp.
[time-range time-range-name] - Allows imposing time limitation on the ACL rule as defined by the
parameter time-range-name. If a time range with the specified name does not exist and the ACL
containing this ACL rule is applied to an interface or bound to a VLAN, then the ACL rule is applied
immediately. If a time range with specified name exists and the ACL containing this ACL rule is
applied to an interface or bound to a VLAN, then the ACL rule is applied when the time-range with
specified name becomes active. The ACL rule is removed when the time-range with specified name
becomes inactive.
[{range {portkey|startport} {portkey|endport}} | {eq | neq | lt | gt} {portkey|0-65535}] – Specifies
the layer 4 port match confition for the IP ACL rule. Note: This option is available only if the protocol
is tcp or udp.
flag – Specifies that the IP ACL rule matches on the TCP flags. Note: This opetion is available only if
the protol is tcp.
fragments – Spectifies that the IP ACL rule matches on fragmented IP packets.
[rate-limit rate burst-size] – Specifies the allowed rate of traffic as per the configured rate in kbps,
and burst –size in kbytes.
[redirectExtAgent agent-id] - allows matching flow packets to be sent to external applications
running alongside ICOS on a control CPU. agent-id is a unique identifier for the external receive
client application.
Layer 2/3/4 Managed Switch
QuantaMesh | Switching Commands
588

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the QuantaMesh and is the answer not in the manual?

Table of Contents

Save PDF