Access Control
IPv4-based ACL Creation
Cisco 350, 350X and 550X Series Managed Switches, Firmware Release 2.4, ver 0.4 401
22
NOTE Given a mask of 0000 0000 0000 0000 0000 0000 1111 1111 (which means that
you match on the bits where there is 0 and don't match on the bits where there are 1's).
You need to translate the 1's to a decimal integer and you write 0 for each four zeros. In
this example since 1111 1111 = 255, the mask would be written: as 0.0.0.255.
• Source MAC Address—Select Any if all source address are acceptable or User defined
to enter a source address or range of source addresses.
• Source MAC Address Value—Enter the MAC address to which the source MAC
address is to be matched and its mask (if relevant).
• Source MAC Wildcard Mask—Enter the mask to define a range of MAC addresses.
• VLAN ID—Enter the VLAN ID section of the VLAN tag to match.
• 802.1p—Select Include to use 802.1p.
• 802.1p Value—Enter the 802.1p value to be added to the VPT tag.
• 802.1p Mask—Enter the wildcard mask to be applied to the VPT tag.
• Ethertype—Enter the frame Ethertype to be matched.
STEP 5 Click Apply. The MAC-based ACE is saved to the Running Configuration file.
IPv4-based ACL Creation
IPv4-based ACLs are used to check IPv4 packets, while other types of frames, such as ARPs,
are not checked.
The following fields can be matched:
• IP protocol (by name for well-known protocols, or directly by value)
• Source/destination ports for TCP/UDP traffic
• Flag values for TCP frames
• ICMP and IGMP type and code
• Source/destination IP addresses (including wildcards)
• DSCP/IP-precedence value
NOTE ACLs are also used as the building elements of flow definitions for per-flow QoS handling.