Cisco Cisco Packet Data Interworking Function (PDIF) トラブルシューティングガイド
ACL Configuration Mode Commands
redirect context (by IP packets) ▀
Cisco ASR 5000 Series Command Line Interface Reference ▄
OL-22947-02
This option is used in conjunction with the
option to specify a group of addresses for which
packets are to be filtered.
The mask must be entered as a complement:
The mask must be entered as a complement:
Zero-bits in this parameter mean that the corresponding bits configured for the
parameter must be identical.
One-bits in this parameter mean that the corresponding bits configured for the
parameter must be ignored.
Important:
The mask must contain a contiguous set of one-bits from the least significant bit (LSB). Therefore,
allowed masks are 0, 1, 3, 7, 15, 31, 63, 127, and 255. For example, acceptable wildcards are 0.0.0.3, 0.0.0.255, and
0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.
0.0.15.255. A wildcard of 0.0.7.15 is not acceptable since the one-bits are not contiguous.
Indicates packet redirection is to be applied to IP packet fragments only.
Indicates that the packet filtering is to be applied to a specific protocol number.
can be any integer ranging from 0 to 255.
Usage
Block IP packets when the source and destination are of interest.
Important:
The maximum number of rules that can be configured per ACL varies depending on how the ACL is
to be used. For more information, refer to the Engineering Rules appendix in the System Administration Guide.
Important:
Also note that ―redirect‖ rules are ignored for ACLs applied to specific subscribers or all subscribers
facilitated by a specific context.
Example
The following command defines a rule that redirects packets to the context with the context ID of 23, and IP packets
coming from the host with the IP address 198.162.100.25, and fragmented packets for any destination are matched:
The following command defines a rule that redirects packets to the context with the context ID of 23, and IP packets
coming from the host with the IP address 198.162.100.25, and fragmented packets for any destination are matched:
The following sets the insertion point before the rule defined above:
The following command sets the insertion point after the first rule defined above:
The following deletes the first rule defined above: