Specifications
Table Of Contents
- Title Page
- Notice
- Contents
- acl Commands
- acl-edit Commands
- aging Commands
- arp Commands
- cli Commands
- configure Command
- copy Command
- dvmrp Commands
- enable Command
- erase Command
- exit Command
- file Commands
- filters Commands
- http Commands
- igmp Commands
- interface Commands
- ip Commands
- ip-router Commands
- Command Summary
- ip-router authentication add key-chain
- ip-router authentication create key-chain
- ip-router global add
- ip-router global set
- ip-router global set trace-options
- ip-router global set trace-state
- ip-router global use provided_config
- ip-router kernel trace
- ip-router policy add filter
- ip-router policy add optional-attributes-list
- ip-router policy aggr-gen destination
- ip-router policy create aggregate-export-source
- ip-router policy create aggr-gen-dest
- ip-router policy create aggr-gen-source
- ip-router policy create aspath-export-source
- ip-router policy create bgp-export-destination
- ip-router policy create bgp-export-source
- ip-router policy create bgp-import-source
- ip-router policy create direct-export-source
- ip-router policy create filter
- ip-router policy create optional-attributes-list
- ip-router policy create ospf-export-destination
- ip-router policy create ospf-export-source
- ip-router policy create ospf-import-source
- ip-router policy create rip-export-destination
- ip-router policy create rip-export-source
- ip-router policy create rip-import-source
- ip-router policy create static-export-source
- ip-router policy create tag-export-source
- ip-router policy export destination
- ip-router policy import source
- ip-router policy redistribute
- ip-router show configuration file
- ip-router show state
- ipx Commands
- l2-tables Commands
- logout Command
- multicast Commands
- mtrace Command
- negate Command
- no Command
- ospf Commands
- Command Summary
- ospf add interface
- ospf add nbma-neighbor
- ospf add network
- ospf add stub-host
- ospf add virtual-link
- ospf create area
- ospf create-monitor
- ospf monitor
- ospf set area
- ospf set ase-defaults
- ospf set export-interval
- ospf set export-limit
- ospf set interface
- ospf set monitor-auth-method
- ospf set trace-options
- ospf set virtual-link
- ospf show
- ospf start|stop
- ping Command
- port Commands
- qos Commands
- reboot Command
- rip Commands
- save Command
- show Command
- snmp Commands
- statistics Commands
- stp Commands
- system Commands
- Command Summary
- system image add
- system image choose
- system image delete
- system image list
- system promimage upgrade
- system set bootprom
- system set contact
- system set date
- system set dns
- system set location
- system set name
- system set password
- system set poweron-selftest
- system set syslog
- system set terminal
- system show
- traceroute Command
- vlan Commands

Chapter 1: acl Commands
1 - 14 SSR Command Line Interface Reference Manual
<SrcNetmask>
Source network mask. This field specifies a group of net-
works for which the ACL applies. This mask field is ANDed
with the network portion of
<SrcAddr>
and the source net-
work of the incoming packets to determine a hit. The SSR
will interpret this number in hexadecimal format. You do not
need to use a “0x” prefix.
This is an optional argument and if you omit the argument,
the SSR uses the hexadecimal value FFFFFFFF.
<DstNetmask>
Destination network mask. This field specifies a group of net-
works for which the ACL applies. This mask field is ANDed
with the network portion of
<DstAddr>
and the destination
network of the incoming packets to determine a hit.The SSR
will interpret this number in hexadecimal format. You do not
need to use a “0x” prefix.
This is an optional argument and if you omit the argument,
the SSR uses the hexadecimal value FFFFFFFF.
Restrictions
When you apply an ACL to an interface, the SSR appends an implicit deny rule to that
ACL. The implicit deny rule denies all traffic. If you intend to allow all traffic that
doesn’t match your specified ACL rules to go through, you must explicitly define a rule
to permit all traffic.
Examples
Here are some examples of ACL commands for permitting and denying IPX traffic
flows.
ssr(config)# acl 100 permit ipx AAAAAAAA.01:20:0A:F3:24:6D any any any
Creates an ACL to permit IPX traffic from the host with IPX address
AAAAAAAA.01:20:0A:F3:24:6D, any socket, to any other IPX address
(network.node), any socket.
ssr(config)# acl 200 deny ipx F6D5E4.01:20:0A:F3:24:6D 451 any any
Creates an ACL to deny IPX traffic from the host with IPX address
F6D5E4.01:20:0A:F3:24:6D, with socket address 451, to any other IPX address
(network.node), any socket.