User's Manual
62 CHAPTER 4: MANAGING DEVICE SECURITY
Modify
■ Priority — Indicates the rule priority, which determines which rule is
matched to a packet on a firstmatch basis.
■ Source MAC Address — Matches the source MAC address to which
packets are addressed to the ACE.
■ Source Mask — Indicates the source MAC Address wildcard mask.
Wildcards are used to mask all or part of a source address by
specifying which bits are used and which are ignored. A wildcard
mask of FF:FF:FF:FF:FF:FF indicates that no bit is important. A wildcard
of 00.00.00.00.00.00.00 indicates that all bits are important. For
example, if the source MAC address is E0:3B:4A:C2:CA:E2 and the
wildcard mask is 00:00:00:00:00:FF, the first five bytes of the MAC are
used, while the last byte is ignored. For the source MAC address
E0:3B:4A:C2:CA:E2, this wildcard mask matches all MAC addresses in
the range E0:3B:4A:C2:CA:00 to E0:3B:4A:C2:CA:FF.
■ Destination MAC Address — Matches the destination MAC address
to which packets are addressed to the ACE.
■ Destination Mask — Indicates the destination MAC Address
wildcard mask. Wildcards are used to mask all or part of a destination
address by specifying which bits are used and which are ignored. A
wildcard mask of FF:FF:FF:FF:FF indicates that no bit is important. A
wildcard mask of 00.00.00.00.00.00 indicates that all bits are
important. For example, if the destination MAC address is
E0:3B:4A:C2:CA:E2 and the wildcard mask is 00:00:00:00:00:FF, the
first five bytes of the MAC are used, while the last byte is ignored. For
the destination MAC address E0:3B:4A:C2:CA:E2, this wildcard mask
matches all MAC addresses in the range E0:3B:4A:C2:CA:00 to
E0:3B:4A:C2:CA:FF.
■ VLAN ID — Matches the packet's VLAN ID to the ACE. The possible
field values are 1 to 4093.
■ CoS — Classifies traffic based on the CoS tag value.
■ CoS Mask — Defines the CoS mask used to classify network traffic.
■ Ethertype — Provides an identifier that differentiates between
various types of protocols.
■ Action — Indicates the ACL forwarding action. The port can be shut
down, a trap can be sent to the network administrator, or packet is
assigned rate-limiting restrictions for forwarding. The options are: