beautypg.com

Brocade Multi-Service IronWare Security Configuration Guide (Supporting R05.6.00) User Manual

Page 127

background image

Multi-Service IronWare Security Configuration Guide

109

53-1003035-02

Configuring numbered and named ACLs

3

wildcard

Specifies the portion of the source IP host address to match against. The wildcard is a four-part
value in dotted-decimal notation (IP address format) consisting of ones and zeros. Zeros in the
mask mean the packet’s source address must match the source-ip. Ones mean any value
matches. For example, the source-ip and wildcard values 10.157.22.26 0.0.0.255 mean that
all hosts in the Class C subnet 10.157.22.x match the policy.
If you prefer to specify the wildcard (mask value) in Classless Inter domain Routing (CIDR)
format, you can enter a forward slash after the IP address, then enter the number of significant
bits in the mask. For example, you can enter the CIDR equivalent of “10.157.22.26 0.0.0.255”
as “10.157.22.26/24”. The CLI automatically converts the CIDR number into the appropriate
ACL mask (where zeros instead of ones are the significant bits) and changes the non-significant
portion of the IP address into zeros. For example, if you specify 10.157.22.26/24 or
10.157.22.26 0.0.0.255, then save the changes to the startup-config file, the value appears as
10.157.22.0/24 (if you have enabled display of subnet lengths) or 10.157.22.0 0.0.0.255 in
the startup-config file. The IP subnet masks in CIDR format is saved in the file in “/mask-bits
format.
If you use the CIDR format, the ACL entries appear in this format in the running-config and
startup-config files, but are shown with subnet mask in the display produced by the show
access-list command.

destination-ip |
hostname

Specify the destination IP host for the policy. If you want the policy to match on all destination
addresses, enter any.

fragment

Enter this keyword if you want to filter fragmented packets. Refer to

“Enabling ACL filtering of

fragmented or non-fragmented packets”

.

NOTE

The fragmented and non-fragmented parameters cannot be used together in an
ACL entry.

non-fragment

Enter this keyword if you want to filter non-fragmented packets. Refer to

“Enabling ACL filtering

of fragmented or non-fragmented packets”

.

NOTE

The fragmented and non-fragmented parameters cannot be used together in an
ACL entry.