Access Control List Commands
4-89
4
access-list ip extended fragment-auto-mask
This command automatically creates extra masks to support fragmented ACL
entries. Use the no form to disable this feature.
Syntax
[no] access-list ip extended fragment-auto-mask
Default Setting
Disabled
Command Mode
Global Configuration
Command Usage
If this feature is disabled, fragmented packets will not be matched by any ACL
rule, and will be handled according to the default permit or deny rule.
Example
permit, deny (Standard ACL)
This command adds a rule to a Standard IP ACL. The rule sets a filter condition for
packets emanating from the specified source. Use the no form to remove a rule.
Syntax
[no] {permit | deny} {any | source bitmask | host source}
• any – Any source IP address.
• source – Source IP address.
• bitmask – Decimal number representing the address bits to match.
• host – Keyword followed by a specific IP address.
Default Setting
None
Command Mode
Standard ACL
Command Usage
• New rules are appended to the end of the list.
• Address bitmasks are similar to a subnet mask, containing four integers from
0 to 255, each separated by a period. The binary mask uses 1 bits to indicate
“match” and 0 bits to indicate “ignore.” The bitmask is bitwise ANDed with the
specified source IP address, and then compared with the address for each IP
packet entering the port(s) to which this ACL has been assigned.
Console(config)#tacacs-list ip extended fragment-auto-mask
Console(config)#