Add to ACL / Edit ACL Window


Use this window to either add a new rule to the selected ACL or edit an existing rule in an ACL. You can access this window from the ACL Editor by clicking the New or Edit button in the right-panel Editor tab.

ACL Manager supports five types of ACLs: S/K/N 7.x+, N-Series 6.x, X-Series, XSR, and Common. Each ACL type can contain a specific set of rules that define parameters that are appropriate for the devices that they support. Common ACLs can contain rules that are supported by all five types. The rule types that can be used with each of the five ACL types are listed in the ACL Rules Summary.

The parameters/fields in this window will change according to the rule type selected. This help topic provides information for each of the following rule types:

AH, ESP, or GRE Rules

AH, ESP, and GRE rules can be applied to allow or block AH, ESP, and GRE traffic from entering or leaving a router port. The rule definitions for AH, ESP, and GRE traffic share the same parameters. ESP and GRE rules can only be created in S/K/N 7.x+, N-Series 6.x, and XSR ACLs. AH rules can only be created in N-Series 6.x and XSR ACLs.

Sample ESP rule.

Click areas in the window for more information.

Name
The name given to this rule. The name is a string of up to 100 characters or numbers and is usually descriptive of the rule's function. This name is not used in the device. Rather, it serves as a means of identifying rules in ACL Manager.
Action
Permit - allow AH, ESP, or GRE traffic that matches the parameters in this rule to enter or leave the port where this rule is applied.
Deny - block AH, ESP, or GRE traffic that matches the parameters in this rule from entering or leaving the port where this rule is applied.
Remark - allows you to add a remark to the ACL. (Available on S-Series, K-Series, and N-Series devices with 7.x firmware only.)
If the Comment checkbox is checked, the rule will be commented out (disabled).
ACL Type
Identifies the type of ACL the rule is being created for.
Source Address
Allow or block packets with this source address, based on the selected Action (permit/deny). This parameter can be defined as Any source address, a specific IP address or, as a subnet or range of addresses when used with the associated Mask parameter. Typing a slash after entering an address advances the entry marker to the mask field and automatically enters a mask (based on the address).
Destination Address
Allow or block packets with this destination address, based on the selected Action (permit/deny). This parameter can be defined as Any destination address, a specific IP address or, as a subnet or range of addresses when used with the associated Mask parameter. Typing a slash after entering an address advances the entry marker to the mask field and automatically enters a mask (based on the address).
Mask
The mask is used as a filter to define a range of IP addresses. Masks can be entered as CIDR or dotted-decimal format. Address bits from a source or destination address in the header of the packet are ANDed with the associated mask and compared against the source/destination address fields. For example, if you entered 172.90.00.00 into the Source/Destination field and typed 255.255.0.0 as the associated mask, then all incoming packets in the range 172.90.00.00 through 172.90.255.255 would result in an address match.
TOS
Allow or block packets with these ToS (Type of Service) or DSCP (Diffserv Codepoint) values, based on the selected Action (permit/deny). The ToS/DSCP field contained in the IP header of a frame is used by applications to indicate the priority and Quality of Service for each frame.
  • TOS - allow or block packets with the TOS value specified here. You can select from the pre-defined values or specify a decimal number between 0 and 255.
  • Precedence - allow or block packets with the Precedence value specified here. You can select one of the pre-defined values or specify a precedence value of 0-7.
  • DSCP - allow or block packets with the DSCP value specified here. You can select from the pre-defined values or specify a decimal number between 0 and 63. 
 NOTE:IPv4 defines the ToS field as setting the Precedence and Type of Service requested for a packet. IPv6 redefined this field as the DS (Differentiated Service) field containing a DSCP (Differentiated Service Codepoint) value, to define Per-Hop-Behavior (PHB) groups called Expedited Forwarding (EF) and Assured Forwarding (AF). For more information on these PHB groups, refer to RFC 2597 and RFC 2598.
Enable Logging/Enable Verbose Logging
These checkboxes let you enable or disable logging or detailed (verbose) logging for this rule. (Verbose logging is available on S-Series, K-Series, and N-Series devices with 7.x firmware only.) When enabled, a Log message is sent to the device console and if you have a Syslog server configured, the same message is sent to the Syslog server. For more information on logging functionality, refer to your router User's Guide.
Notes
Enter a description of the rule. This information will be displayed in the Editor tab in the ACL Editor.

ICMP or IP Rules

ICMP and IP rules share most of the same parameters, however different parameters apply to the rules depending on which type of ACL they are created for. These rules allow or block ICMP or IP traffic from entering or leaving a router port.

Sample ICMP rule.

Click areas in the window for more information.

Name
The name given to this rule. The name is a string of up to 100 characters or numbers and is usually descriptive of the rule's function. This name is not used in the device. Rather, it serves as a means of identifying rules in ACL Manager.
Action
Permit - allow ICMP/IP traffic that matches the parameters in this rule to enter or leave the port where this rule is applied.
Deny - block ICMP/IP traffic that matches the parameters in this rule from entering or leaving the port where this rule is applied.
Remark - allows you to add a remark to the ACL. (Available on S-Series, K-Series, and N-Series devices with 7.x firmware only.)
If the Comment checkbox is checked, the rule will be commented out (disabled).
ACL Type
Identifies the type of ACL the rule is being created for.
Source Address
Allow or block packets with this source address, based on the selected Action (permit/deny). This parameter can be defined as Any source address, a specific IP address or, as a subnet or range of addresses when used with the associated Mask parameter. Typing a slash after entering an address advances the entry marker to the mask field and automatically enters a mask (based on the address).
Destination Address
Allow or block packets with this destination address, based on the selected Action (permit/deny). This parameter can be defined as Any destination address, a specific IP address or, as a subnet or range of addresses when used with the associated Mask parameter. Typing a slash after entering an address advances the entry marker to the mask field and automatically enters a mask (based on the address).
Mask
The mask is used as a filter to define a range of IP addresses. Masks can be entered as CIDR or dotted-decimal format. Address bits from a source or destination address in the header of the packet are ANDed with the associated mask and compared against the source/destination address fields. For example, if you entered 172.90.00.00 into the Source/Destination field and typed 255.255.0.0 as the associated mask, then all incoming packets in the range 172.90.00.00 through 172.90.255.255 would result in an address match.
TOS
Allow or block packets with these ToS (Type of Service) or DSCP (Diffserv Codepoint) values, based on the selected Action (permit/deny). The ToS/DSCP field contained in the IP header of a frame is used by applications to indicate the priority and Quality of Service for each frame.
  • TOS - allow or block packets with the TOS value specified here. You can select from the pre-defined values or specify a decimal number between 0 and 255.
  • Precedence - allow or block packets with the Precedence value specified here.  You can select one of the pre-defined values or specify a precedence value of 0-7.
  • DSCP - allow or block packets with the DSCP value specified here. You can select from the pre-defined values or specify a decimal number between 0 and 63. 
 NOTE:IPv4 defines the ToS field as setting the Precedence and Type of Service requested for a packet. IPv6 redefined this field as the DS (Differentiated Service) field containing a DSCP (Differentiated Service Codepoint) value, to define Per-Hop-Behavior (PHB) groups called Expedited Forwarding (EF) and Assured Forwarding (AF). For more information on these PHB groups, refer to RFC 2597 and RFC 2598.
Message
ICMP rules can be defined to allow or reject traffic based on ICMP Message Type (0 to 255). When a Message Type is specified, an optional ICMP Message Code (1 to 255) can be used to create a more specific rule.
Enable Logging
These checkboxes let you enable or disable logging or detailed (verbose) logging for this rule. (Verbose logging is available on S-Series, K-Series, and N-Series devices with 7.x firmware only.) When enabled, a Log message is sent to the device console and if you have a Syslog server configured, the same message is sent to the Syslog server. For more information on logging functionality, refer to your router User's Guide.
Notes
Enter a description of the rule. This information will be displayed in the Editor tab in the ACL Editor.

IPINIP Rules

IPINIP rules allow or block IPINIP traffic from entering or leaving a router port. This type of rule can only be created in S/K/N 7.x+and X-Series ACLs.

Sample IPINIP rule.

Click areas in the window for more information.

Name
The name given to this rule. The name is a string of up to 100 characters or numbers and is usually descriptive of the rule's function. This name is not used in the device. Rather, it serves as a means of identifying rules in ACL Manager.
Action
Permit - allow IPINIP traffic that matches the parameters in this rule to enter or leave the port where this rule is applied.
Deny - block IPINIP traffic that matches the parameters in this rule from entering or leaving the port where this rule is applied.
If the Comment checkbox is checked, the rule will be commented out (disabled).
ACL Type
Identifies the type of ACL the rule is being created for.
Source Address
Allow or block packets with this source address, based on the selected Action (permit/deny). This parameter can be defined as Any source address, a specific IP address or, as a subnet or range of addresses when used with the associated Mask parameter. Typing a slash after entering an address advances the entry marker to the mask field and automatically enters a mask (based on the address).
Destination Address
Allow or block packets with this destination address, based on the selected Action (permit/deny). This parameter can be defined as Any destination address, a specific IP address or, as a subnet or range of addresses when used with the associated Mask parameter. Typing a slash after entering an address advances the entry marker to the mask field and automatically enters a mask (based on the address).
Mask
The mask is used as a filter to define a range of IP addresses. Masks can be entered as CIDR or dotted-decimal format. Address bits from a source or destination address in the header of the packet are ANDed with the associated mask and compared against the source/destination address fields. For example, if you entered 172.90.00.00 into the Source/Destination field and typed 255.255.0.0 as the associated mask, then all incoming packets in the range 172.90.00.00 through 172.90.255.255 would result in an address match.
TOS
Allow or block packets with these ToS (Type of Service) or DSCP (Diffserv Codepoint) values, based on the selected Action (permit/deny). The ToS/DSCP field contained in the IP header of a frame is used by applications to indicate the priority and Quality of Service for each frame.
  • TOS - allow or block packets with the TOS value specified here. You can select from the pre-defined values or specify a decimal number between 0 and 255.
  • Precedence - allow or block packets with the Precedence value specified here.  You can select one of the pre-defined values or specify a precedence value of 0-7.
  • DSCP - allow or block packets with the DSCP value specified here. You can select from the pre-defined values or specify a decimal number between 0 and 63. 
 NOTE:IPv4 defines the ToS field as setting the Precedence and Type of Service requested for a packet. IPv6 redefined this field as the DS (Differentiated Service) field containing a DSCP (Differentiated Service Codepoint) value, to define Per-Hop-Behavior (PHB) groups called Expedited Forwarding (EF) and Assured Forwarding (AF). For more information on these PHB groups, refer to RFC 2597 and RFC 2598.
Enable Logging
This check box lets you enable or disable logging for this rule. When enabled, a Log message is sent to the console and if you have a Syslog server configured, the same message is sent to the Syslog server.
Notes
Enter a description of the rule. This information will be displayed in the Editor tab in the ACL Editor.

IP-Protocol Rules

IP-Protocol rules allow or block specific IP traffic from entering or leaving a router port. They can be used to define rules that specify any valid IP protocol other than those specified in other rules, (IP, ICMP, TCP, and UDP). For example, to specify a rule for IP encapsulation in IP, you can use IP protocol type 4 in the rule. IP-Protocol rules are only supported for S/K/N 7.x+ and N-Series 6.x ACLs.

Sample IP-Protocol rule.

Click areas in the window for more information.

Name
The name given to this rule. The name is a string of up to 100 characters or numbers and is usually descriptive of the rule's function. This name is not used in the device. Rather, it serves as a means of identifying rules in ACL Manager.
Action
Permit - allow IP-Protocol traffic that matches the parameters in this rule to enter or leave the port where this rule is applied.
Deny - block IP-Protocol traffic that matches the parameters in this rule from entering or leaving the port where this rule is applied.
Remark - allows you to add a remark to the ACL. (Available on S-Series, K-Series, and N-Series devices with 7.x firmware only.)
If the Comment checkbox is checked, the rule will be commented out (disabled).
ACL Type
Identifies the type of ACL the rule is being created for.
Source Address
Allow or block packets with this source address, based on the selected Action (permit/deny). This parameter can be defined as Any source address, a specific IP address or, as a subnet or range of addresses when used with the associated Mask parameter. Typing a slash after entering an address advances the entry marker to the mask field and automatically enters a mask (based on the address).
Destination Address
Allow or block packets with this destination address, based on the selected Action (permit/deny). This parameter can be defined as Any destination address, a specific IP address or, as a subnet or range of addresses when used with the associated Mask parameter. Typing a slash after entering an address advances the entry marker to the mask field and automatically enters a mask (based on the address).
Mask
The mask is used as a filter to define a range of IP addresses. Masks can be entered as CIDR or dotted-decimal format. Address bits from a source or destination address in the header of the packet are ANDed with the associated mask and compared against the source/destination address fields. For example, if you entered 172.90.00.00 into the Source/Destination field and typed 255.255.0.0 as the associated mask, then all incoming packets in the range 172.90.00.00 through 172.90.255.255 would result in an address match.
IP Protocol Number
Select a Pre-Defined protocol or enter a number (1-255).
TOS
Allow or block packets with these ToS (Type of Service) or DSCP (Diffserv Codepoint) values, based on the selected Action (permit/deny). The ToS/DSCP field contained in the IP header of a frame is used by applications to indicate the priority and Quality of Service for each frame.
  • TOS - allow or block packets with the TOS value specified here. You can select from the pre-defined values or specify a decimal number between 0 and 255.
  • Precedence - allow or block packets with the Precedence value specified here.  You can select one of the pre-defined values or specify a precedence value of 0-7.
  • DSCP - allow or block packets with the DSCP value specified here. You can select from the pre-defined values or specify a decimal number between 0 and 63. 
 NOTE:IPv4 defines the ToS field as setting the Precedence and Type of Service requested for a packet. IPv6 redefined this field as the DS (Differentiated Service) field containing a DSCP (Differentiated Service Codepoint) value, to define Per-Hop-Behavior (PHB) groups called Expedited Forwarding (EF) and Assured Forwarding (AF). For more information on these PHB groups, refer to RFC 2597 and RFC 2598.
Enable Logging
These checkboxes let you enable or disable logging or detailed (verbose) logging for this rule. (Verbose logging is available on S-Series, K-Series, and N-Series devices with 7.x firmware only.) When enabled, a Log message is sent to the device console and if you have a Syslog server configured, the same message is sent to the Syslog server. For more information on logging functionality, refer to your router User's Guide.
Notes
Enter a description of the rule. This information will be displayed in the Editor tab in the ACL Editor.

Standard Rules

Standard rules can be applied to allow or block IP traffic from a specific source address from entering or leaving a router port. A Standard rule cannot be created in Common ACLs.

Sample Standard rule.

Click areas in the window for more information.

Name
The name given to this rule. The name is a string of up to 100 characters or numbers and is usually descriptive of the rule's function. This name is not used in the device. Rather, it serves as a means of identifying rules in ACL Manager.
Action
Permit - allow IP traffic that matches the parameters in this rule to enter or leave the port where this rule is applied.
Deny - block IP traffic that matches the parameters in this rule from entering or leaving the port where this rule is applied.
If the Comment checkbox is checked, the rule will be commented out (disabled).
ACL Type
Identifies the type of ACL the rule is being created for.
Source Address
Allow or block packets with this source address, based on the selected Action (permit/deny). This parameter can be defined as Any source address, a specific IP address or, as a subnet or range of addresses when used with the associated Mask parameter. Typing a slash after entering an address advances the entry marker to the mask field and automatically enters a mask (based on the address).
Mask
The mask is used as a filter to define a range of IP addresses. Masks can be entered as CIDR or dotted-decimal format. Address bits from a source address in the header of the packet are ANDed with the associated mask and compared against the source address field. For example, if you entered 172.90.00.00 into the Source field and typed 255.255.0.0 as the associated mask, then all incoming packets in the range 172.90.00.00 through 172.90.255.255 would result in an address match.
Enable Logging
This check box lets you enable or disable logging for this rule. When enabled, a Log message is sent to the console and if you have a Syslog server configured, the same message is sent to the Syslog server.
Notes
Enter a description of the rule. This information will be displayed in the Editor tab in the ACL Editor.

TCP or UDP Rules

TCP and UDP rules allow or block TCP or UDP traffic from entering or leaving a router port. TCP and UDP rules can be created in S/K/N 7.x+, N-Series 6.x, X-Series, XSR, and Common ACLs. When created for S/K/N 7.x+, N-Series 6.x, and X-Series ACLs, these rules provide additional settings for Type of Service and Logging.

Sample TCP rule.

Click areas in the window for more information.

Name
The name given to this rule. The name is a string of up to 100 characters or numbers and is usually descriptive of the rule's function. This name is not used in the device. Rather, it serves as a means of identifying rules in ACL Manager.
Action
Permit - allow TCP/UDP traffic that matches the parameters in this rule to enter or leave the port where this rule is applied.
Deny - block TCP/UDP traffic that matches the parameters in this rule from entering or leaving the port where this rule is applied.
Remark - allows you to add a remark to the ACL. (Available on S-Series, K-Series, and N-Series devices with 7.x firmware only.)
If the Comment checkbox is checked, the rule will be commented out (disabled).
ACL Type
Identifies the type of ACL the rule is being created for.
Source Address
Allow or block packets with this source address, based on the selected Action (permit/deny). This parameter can be defined as Any source address, a specific IP address or, as a subnet or range of addresses when used with the associated Mask parameter. Typing a slash after entering an address advances the entry marker to the mask field and automatically enters a mask (based on the address).
Destination Address
Allow or block packets with this destination address, based on the selected Action (permit/deny). This parameter can be defined as Any destination address, a specific IP address or, as a subnet or range of addresses when used with the associated Mask parameter. Typing a slash after entering an address advances the entry marker to the mask field and automatically enters a mask (based on the address).
Mask
The mask is used as a filter to define a range of IP addresses. Masks can be entered as CIDR or dotted-decimal format. Address bits from a source or destination address in the header of the packet are ANDed with the associated mask and compared against the source/destination address fields. For example, if you entered 172.90.00.00 into the Source/Destination field and typed 255.255.0.0 as the associated mask, then all incoming packets in the range 172.90.00.00 through 172.90.255.255 would result in an address match.
Source Port
Filter or forward packets using this source port argument, based on the selected Action (permit/deny). You can set the source port as Any source TCP/UDP port, select a TCP/UDP type from the list of well-known values, or select Other and manually enter the value in decimal form. TCP/UDP port address. You can also enter a range of values. (TCP/UDP port numbers are defined in RFC 1700.)
  TIP: You can define a new value for a TCP/UDP port number using the Pre-Defined Well-Known IDs window. Once defined, it is available for selection from the list of well-known values.
Destination Port
Filter or forward packets using this destination port argument, based on the selected Action (permit/deny). You can set the destination port as Any source TCP/UDP port, select a TCP/UDP type from the list of well-known values, or select Other and manually enter the value in decimal form. TCP/UDP port address. You can also enter a range of values. (TCP/UDP port numbers are defined in RFC 1700.)
TOS
Allow or block packets with these ToS (Type of Service) or DSCP (Diffserv Codepoint) values, based on the selected Action (permit/deny). The ToS/DSCP field contained in the IP header of a frame is used by applications to indicate the priority and Quality of Service for each frame.
  • TOS - allow or block packets with the TOS value specified here. You can select from the pre-defined values or specify a decimal number between 0 and 255.
  • Precedence - allow or block packets with the Precedence value specified here.  You can select one of the pre-defined values or specify a precedence value of 0-7.
  • DSCP - allow or block packets with the DSCP value specified here. You can select from the pre-defined values or specify a decimal number between 0 and 63. 
 NOTE:IPv4 defines the ToS field as setting the Precedence and Type of Service requested for a packet. IPv6 redefined this field as the DS (Differentiated Service) field containing a DSCP (Differentiated Service Codepoint) value, to define Per-Hop-Behavior (PHB) groups called Expedited Forwarding (EF) and Assured Forwarding (AF). For more information on these PHB groups, refer to RFC 2597 and RFC 2598.
Established
Indicates whether this rule will allow TCP/UDP responses through the router, provided the connection between two hosts is already established.
Enable Logging
These checkboxes let you enable or disable logging or detailed (verbose) logging for this rule. (Verbose logging is available on S-Series, K-Series, and N-Series devices with 7.x firmware only.) When enabled, a Log message is sent to the device console and if you have a Syslog server configured, the same message is sent to the Syslog server. For more information on logging functionality, refer to your router User's Guide.
Notes
Enter a description of the rule. This information will be displayed in the Editor tab in the ACL Editor.
Swap Swap Button
Exchanges the Source and Destination Address parameters. The source address and mask become the destination address and mask and vice-versa.
Swap Source/Dest Ports Swap Ports Button
Exchanges the Source and Destination Port parameters. The source port parameters become the destination port parameters and vice-versa.

For information on related windows:

For information on related tasks: