![](http://pdfasset.owneriq.net/5/87/5875d4be-282b-42bc-b125-337cedb21b7d/5875d4be-282b-42bc-b125-337cedb21b7d-bga7.png)
A
CCESS
C
ONTROL
L
ISTS
3-115
specify a host address (not a subnet), or “IP” to specify a range of
addresses. (Options: Any, Host, IP; Default: Any)
• Source/Destination Subnet Mask – Source or destination address
of rule must match this bitmask. (See the description for SubMask on
page 3-107.)
• Protocol Mask – Check the protocol field.
• Service Type Mask – Check the rule for the specified priority type.
(Options: Precedence, TOS, DSCP; Default: TOS)
• Source/Destination Port Bit Mask – Protocol port of rule must
match this bitmask. (Range: 0-65535)
• Control Code Bit Mask – Control flags of rule must match this
bitmask. (Range: 0-63)