User's Manual

60 CHAPTER 4: MANAGING DEVICE SECURITY
Add Rules to ACL
Priority — Indicates the ACE priority, which determines which ACE is
matched to a packet on a first-match basis. The possible field values
are 1-2147483647.
Source MAC Address — Matches the source MAC address to which
packets are addressed to the ACE.
Source Mask Indicates the source MAC Address wildcard mask.
Wildcards are used to mask all or part of a source MAC address.
Wildcard masks specify which bits are used and which are ignored. A
wildcard mask of FF:FF:FF:FF:FF:FF indicates that no bit is important. A
wildcard of 00.00.00.00.00.00.00 indicates that all bits are important.
For example, if the source MAC address is 00:AB:22:11:33:00 and the
wildcard mask is 00:00:00:00:00:FF, the first five bytes of the MAC are
used, while the last byte is ignored. For the source MAC address
00:AB:22:11:33:00, this wildcard mask matches all MAC addresses in
the range 00:AB:22:11:33:00 to 00:AB:22:11:33:FF.
Destination MAC Address — Matches the destination MAC address
to which packets are addressed to the ACE.
Destination Mask — Indicates the destination MAC Address
wildcard mask. Wildcards are used to mask all or part of a destination
MAC address. Wildcard masks specify which bits are used and which
are ignored. A wildcard mask of FF:FF:FF:FF:FF:FF indicates that no bit
is important. A wildcard mask of 00.00.00.00.00.00 indicates that all
bits are important. For example, if the destination MAC address is
00:AB:22:11:33:00 and the wildcard mask is 00:00:00:00:00:FF, the
first five bytes of the MAC are used, while the last byte is ignored. For
the destination MAC address 00:AB:22:11:33:00, this wildcard mask
matches all MAC addresses in the range 00:AB:22:11:33:00 to
00:AB:22:11:33:FF.
VLAN ID — Matches the packet's VLAN ID to the ACE. The possible
field values are 1 to 4093.
CoS — Classifies traffic based on the CoS tag value.
CoS Mask — Defines the CoS mask used to classify network traffic.
Ethertype — Provides an identifier that differentiates between
various types of protocols.
Action — Indicates the ACL forwarding action. In addition, the port
can be shut down, a trap can be sent to the network administrator, or