Dell Force10 S2410-01-10GE-24P SFTOS Command Reference - Page 380

IP Extended ACL, IP Standard ACL

Page 380 highlights

www.dell.com | support.dell.com Syntax IP Standard ACL: OOEnn6g1a-9n9C{deny | permit} {every | srcip srcmask} [log] [assign-queue queue-id] [{mirror | redirect} unit/slot/port] Note: The mirror option is supported in the S50V and S25P models only. IP Extended ACL: access-list 100-199 {deny | permit} {every | icmp | igmp | ip | tcp | udp | protocol_number} {any | srcip srcmask} {any | eq {portkey | 0-65535}{any | dstip dstmask} [eq {portkey | 0-65535}] [precedence precedence | tos tos tosmask | dscp dscp] [log] [assign-queue queue-id] [redirect unit/slot/port] Use the no access-list ACLnumber version of this command to delete an ACL (identified by a number in the range 1-199). Parameters 1-99 and 100-199 deny | permit every | srcip srcmask every | icmp | igmp | ip | tcp | udp | protocol_number any|srcip and srcmask {any|eq {portkey | 0-65535}] {any|dstip dstmask} eq {portkey | 0-65535} [precedence precedence | tos tos tosmask | dscp dscp] Assign an integer in the range 1 to 99 to an access list for an IP standard ACL. Use an integer in the range 100 to 199 for an IP extended ACL. Specify whether the IP ACL rule permits or denies an action. For an IP Standard ACL, select the source to filter. Enter either the keyword every, to match every packet, or use the srcip and srcmask parameters to specify a source IP address and source mask for a match condition of the ACL rule (srcmask is an inverse mask, also called a wildcard mask, as described at the beginning of this chapter). For an IP Extended ACL, you have three choices for the source to filter: • As above, the keyword every matches every packet. • The other keywords specify the protocol to filter- ICMP, IGMP, IP, TCP, or UDP. • Otherwise, enter the protocol number to match, from 1 to 255. Enter either any, to match any source IP address, or use the srcip and srcmask parameters to specify a source IP address and source mask for a match condition of the ACL rule (srcmask is an inverse mask, also called a wildcard mask, as described at the beginning of this chapter). For an IP Extended ACL, specify the source Layer 4 port match condition for the IP ACL rule. You can enter: • the keyword any, to accept any Layer 4 port ID • the keyword eq and then enter either: •the portkey, which can be one of the following keywords: domain, echo, ftp, ftpdata, http, smtp, snmp, telnet, tftp, or www. Each of these values translates into its equivalent port number, which is used as both the start and end of a port range. •the Layer 4 port number, which ranges from 0-65535 For an IP Extended ACL, specify a destination IP address and destination mask for the match condition of the ACL rule (dstmask is an inverse mask, as above). This option is available for both any and dstip dstmask, and the variables are as defined above. (OPTIONAL) For an IP Extended ACL, specifies the type of service (TOS) for an IP ACL rule depending on a match of precedence or DSCP values using the parameters precedence, tos/tosmask, dscp. 380 | ACL Commands

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514

380
|
ACL Commands
www.dell.com | support.dell.com
Syntax
IP Standard ACL:
OOEnn6ganC
1-99
{
deny
|
permit
} {
every
|
srcip
srcmask
} [
log
] [
assign-queue
queue-id
]
[{
mirror
|
redirect
}
unit/slot/port
]
IP Extended ACL:
access-list
100-199
{
deny
|
permit
} {
every
|
icmp
|
igmp
|
ip
|
tcp
|
udp
|
protocol_number
}
{
any
|
srcip
srcmask
} {
any
|
eq
{
portkey
|
0-65535
}{
any
|
dstip
dstmask
} [
eq
{
portkey
|
0-65535
}] [
precedence
precedence
|
tos
tos
tosmask
|
dscp
dscp
] [
log
] [
assign-queue
queue-id
] [
redirect
unit/slot/port
]
Use the
no access-list
ACLnumber
version of this command to delete an ACL (identified by a
number in the range
1-199
).
Parameters
Note:
The
mirror
option is supported in the S50V and S25P models only.
1-99
and
100-199
Assign an integer in the range 1 to 99 to an access list for an IP standard ACL. Use
an integer in the range 100 to 199 for an IP extended ACL.
deny
|
permit
Specify whether the IP ACL rule permits or denies an action.
every
|
srcip
srcmask
For an
IP Standard ACL
, select the source to filter. Enter either the keyword
every
, to match every packet, or use the
srcip
and
srcmask
parameters to
specify a source IP address and source mask for a match condition of the ACL
rule (
srcmask
is an inverse mask, also called a wildcard mask, as described at
the beginning of this chapter).
every | icmp
|
igmp
|
ip
|
tcp
|
udp
|
protocol_number
For an
IP Extended ACL
, you have three choices for the source to filter:
As above, the keyword
every
matches every packet.
The other keywords specify the protocol to filter— ICMP, IGMP, IP, TCP, or
UDP.
Otherwise, enter the protocol number to match, from 1 to 255.
any|
srcip
and
srcmask
Enter either
any
, to match any source IP address, or use the
srcip
and
srcmask
parameters to specify a source IP address and source mask for a match condition
of the ACL rule (
srcmask
is an inverse mask, also called a wildcard mask, as
described at the beginning of this chapter).
{
any|eq
{
portkey
|
0-65535
}]
For an
IP Extended ACL
, specify the source Layer 4 port match condition for the
IP ACL rule. You can enter:
the keyword
any
, to accept any Layer 4 port ID
the keyword
eq
and then enter either:
•the
portkey
, which can be one of the following keywords:
domain
,
echo
,
ftp
,
ftpdata
,
http
,
smtp
,
snmp
,
telnet
,
tftp
, or
www
.
Each of these values translates into its equivalent port number, which is
used as both the start and end of a port range.
•the Layer 4 port number, which ranges from 0-65535
{
any|
dstip dstmask
}
For an
IP Extended ACL
, specify a destination IP address and destination mask
for the match condition of the ACL rule (
dstmask
is an inverse mask, as above).
eq
{
portkey
|
0-65535
}
This option is available for both
any
and
dstip dstmask,
and the variables are
as defined above.
[
precedence
precedence
|
tos
tos
tosmask
|
dscp
dscp
]
(OPTIONAL) For an
IP Extended ACL
, specifies the type of service (TOS) for
an IP ACL rule depending on a match of precedence or DSCP values using the
parameters
precedence
,
tos/tosmask
,
dscp
.