Yamaha 10G SWR2310-28GT/18GT/10G Command Reference - Page 229

Setting value, Description, Method of specifying, Initial value], Input mode], Description], access-

Page 229 highlights

src-port dst-info dst-port Setting value A.B.C.D/M host A.B.C.D any Command Reference | Traffic control | 229 Description Specifies an IPv4 address (A.B.C.D) with subnet mask length (Mbit) Specifies a single IPv4 address (A.B.C.D) Applies to all IPv4 addresses : If protocol is specified as tcp or udp, this specifies the transmission source port number that is the condition. This can also be omitted. Method of specifying Description eq X Specify port number (X) range X Y Specify port numbers (X) through (Y) : Specifies the destination IPv4 address information that is the condition Setting value A.B.C.D E.F.G.H A.B.C.D/M host A.B.C.D any Description Specifies an IPv4 address (A.B.C.D) with wildcard bits (E.F.G.H) Specifies an IPv4 address (A.B.C.D) with subnet mask length (Mbit) Specifies a single IPv4 address (A.B.C.D) Applies to all IPv4 addresses : If protocol is specified as tcp or udp, this specifies the destination port number that is the condition. This can also be omitted. Method of specifying Description eq X Specify port number (X) range X Y Specify port numbers (X) through (Y) [Initial value] none [Input mode] global configuration mode [Description] Generates an IPv4 access list. Multiple conditions (maximum 256) can be specified for the generated access list. To apply the generated access list, use the access-group command of interface mode. If the "no" syntax is used to specify "action" and following, the IPv4 access list that matches all conditions is deleted. If the "no" syntax is used without specifying "action" and following, the IPv4 access list of the matching ID of access list is deleted. [Note] An access list that is applied to LAN/SFP port and logical interface cannot be deleted using the "no" syntax. You must first cancel the application, and then delete the access list. For both src-port and dst-port, you can use "range" to specify a range; however for the entire system, only one IPv4 access list that specifies a range in this way can be applied to the interface by using the access-group command. [Example] Create access list #1 that denies communication from the source segment 192.168.1.0/24 to the destination 172.16.1.1.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278

Setting value
Description
A.B.C.D/M
Specifies an IPv4 address (A.B.C.D) with subnet
mask length (Mbit)
host A.B.C.D
Specifies a single IPv4 address (A.B.C.D)
any
Applies to all IPv4 addresses
src-port
:
<0-65535>
If protocol is specified as tcp or udp, this specifies the transmission source port number <0-65535>
that is the condition. This can also be omitted.
Method of specifying
Description
eq X
Specify port number (X)
range X Y
Specify port numbers (X) through (Y)
dst-info
:
Specifies the destination IPv4 address information that is the condition
Setting value
Description
A.B.C.D E.F.G.H
Specifies an IPv4 address (A.B.C.D) with
wildcard bits (E.F.G.H)
A.B.C.D/M
Specifies an IPv4 address (A.B.C.D) with subnet
mask length (Mbit)
host A.B.C.D
Specifies a single IPv4 address (A.B.C.D)
any
Applies to all IPv4 addresses
dst-port
:
<0-65535>
If protocol is specified as tcp or udp, this specifies the destination port number <0-65535> that is the
condition. This can also be omitted.
Method of specifying
Description
eq X
Specify port number (X)
range X Y
Specify port numbers (X) through (Y)
[Initial value]
none
[Input mode]
global configuration mode
[Description]
Generates an IPv4 access list.
Multiple conditions (maximum 256) can be specified for the generated access list.
To apply the generated access list, use the
access-group
command of interface mode.
If the "no" syntax is used to specify "action" and following, the IPv4 access list that matches all conditions is deleted.
If the "no" syntax is used without specifying "action" and following, the IPv4 access list of the matching ID of access list is
deleted.
[Note]
An access list that is applied to LAN/SFP port and logical interface cannot be deleted using the "no" syntax. You must first
cancel the application, and then delete the access list.
For both src-port and dst-port, you can use "range" to specify a range; however for the entire system, only one IPv4 access list
that specifies a range in this way can be applied to the interface by using the
access-group
command.
[Example]
Create access list #1 that denies communication from the source segment 192.168.1.0/24 to the destination 172.16.1.1.
Command Reference | Traffic control |
229