8 ip access control list (acl) commands, 1 access-list, 8 ip access control list (acl) commands - 27 – Kontron AT890X Full-Size CLI User Manual

Page 193: Access-list - 27

Advertising
background image

AT8901/2/3

Quality of Service (QoS) Commands

Page 4 - 27

AT8901/2/3 CLI Reference Manual

Format

show mac access-lists [name]

Mode

Privileged EXEC

Rule Number The ordered rule number identifier defined within the MAC ACL.
Action

Displays the action associated with each rule. The possible values are
Permit or Deny.

Source MAC Address Displays the source MAC address for this rule.
Destination MAC Address Displays the destination MAC address for this rule.
Ethertype

Displays the Ethertype keyword or custom value for this rule.

VLAN ID

Displays the VLAN identifier value or range for this rule.

COS

Displays the COS (802.1p) value for this rule.

Log

Displays when you enable logging for the rule.

Assign Queue Displays the queue identifier to which packets matching this rule are

assigned.

Mirror Interface On Broadcom 5650x platforms, displays the unit/slot/port to which

packets matching this rule are copied.

Redirect Interface On Broadcom 5650x platforms, displays the unit/slot/port to

which packets matching this rule are forwarded.

4.8

IP Access Control List (ACL) Commands

This section describes the commands you use to configure IP ACL settings. IP ACLs
ensure that only authorized users have access to specific resources and block any
unwarranted attempts to reach network resources.

The following rules apply to IP ACLs:

FASTPATH does not support IP ACL configuration for IP packet fragments.

The maximum number of ACLs you can create is 100, regardless of type.

The maximum number of rules per IP ACL is hardware dependent.

On Broadcom 5630x platforms, if you configure a MAC ACL on an interface, you
cannot configure an IP ACL on the same interface.

Wildcard masking for ACLs operates differently from a subnet mask. A wildcard
mask is in essence the inverse of a subnet mask. With a subnet mask, the mask has
ones (1's) in the bit positions that are used for the network address, and has zeros
(0's) for the bit positions that are not used. In contrast, a wildcard mask has (0’s) in
a bit position that must be checked. A ‘1’ in a bit position of the ACL mask indi-
cates the corresponding bit can be ignored.

4.8.1

access-list

This command creates an IP Access Control List (ACL) that is identified by the access
list number, which is 1-99 for standard ACLs or 100-199 for extended ACLs

.

Table 2

describes the parameters for the

access-list

command.

IP Standard ACL:

Advertising