ProCurve 6200yl User's Guide Page 315

  • Download
  • Add to my manuals
  • Print
  • Page
    / 596
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 314
10-29
Access Control Lists (ACLs)
ACL Operation
Note The order in which an ACE occurs in an ACL is significant. For example, if an
ACL contains six ACEs, but the first ACE allows Permit Any forwarding, then
the ACL permits all IP traffic, and the remaining ACEs in the list do not apply,
even if they specify criteria that would make a match with any of the IP traffic
permitted by the first ACE.
For example, suppose you want to configure an ACL on the switch (with an
ID of “Test-02”) to invoke these policies for routed IP traffic entering the
switch on VLAN 12 :
1. Permit all inbound IP traffic from IP address 10.11.11.42.
2. Deny only the inbound Telnet traffic from address 10.11.11.101.
3. Permit only inbound Telnet traffic from IP address 10.11.11.33.
4. Deny all other inbound IP traffic.
The following ACL model , when assigned to inbound filtering on an interface,
supports the above case:
Figure 10-7. Example of How an ACL Filters Packets
ip access-list extended "Test-02"
10 permit ip 10.11.11.42 0.0.0.0 0.0.0.0 255.255.255.255
20 deny tcp 10.11.11.101 0.0.0.0 0.0.0.0 255.255.255.255 eq 23
30 permit ip 10.11.11.101 0.0.0.0 0.0.0.0 255.255.255.255
40 permit tcp 10.11.11.33 0.0.0.0 0.0.0.0 255.255.255.255 eq 23
< Implicit Deny >
exit
ProCurve(config)# vlan 12 ip access-group Test-02 in
4
2. Denies Telnet traffic from source address 10.11.11.101. Packets
matching this criterion are dropped and are not compared to
later criteria in the list. Packets not matching this criterion are
compared to the next entry in the list.
1. Permits IP traffic from source address 10.11.11.42. Packets
matching this criterion are permitted and will not be compared
to any later ACE in the list. Packets not matching this criterion
will be compared to the next entry in the list.
4. Permits Telnet traffic from source address 10.11.11.33. Packets
matching this criterion are permitted and are not compared to
any later criteria in the list. Packets not matching this criterion
are compared to the next entry in the list.
5. This entry does not appear in an actual ACL, but is implicit as
the last entry in every ACL. Any packets that do not match any
of the criteria in the ACLs preceding entries will be denied
(dropped), and will not cross VLAN 12.
1
2
3. Permits any IP traffic from source address 10.11.11.101. Any
packets matching this criterion will be permitted and will not be
compared to any later criteria in the list. Because this entry
comes after the entry blocking Telnet traffic from this same
address, there will not be any Telnet packets to compare with
this entry; they have already been dropped as a result of
matching the preceding entry.
3
5
Page view 314
1 2 ... 310 311 312 313 314 315 316 317 318 319 320 ... 595 596

Comments to this Manuals

No comments