ProCurve 6200yl User's Guide Page 362

  • Download
  • Add to my manuals
  • Print
  • Page
    / 596
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 361
10-76
Access Control Lists (ACLs)
Configuring Extended ACLs
< deny | permit >
Specifies whether to deny (drop) or permit (forward) a packet
that matches the criteria specified in the ACE, as described
below.
< ip | ip-protocol | ip-protocol-nbr >
Specifies the packet protocol type required for a match. An
extended ACL must include one of the following:
ip any IP packet.
ip-protocol any one of the following IP protocol names:
ip-in-ip ipv6-in-ip gre esp ah
ospf pim vrrp sctp tcp*
udp* icmp* igmp*
ip-protocol-nbr the IPv4 IP protocol number of an IP packet
type, such as “8” for Exterior Gateway Protocol or 121 for
Simple Message Protocol. (For a listing of IP protocol
numbers and their corresponding protocol names, refer to
the IANA “Protocol Number Assignment Services” at
www.iana.com.) (Range: 0 - 255)
* For TCP, UDP, ICMP, and IGMP, additional criteria can be
specified, as described later in this section.
< any | host < SA > | SA/mask-length | SA < mask >>
In an extended ACL, this parameter defines the source IP
address (SA) that a packet must carry in order to have a match
with the ACE.
anySpecifies all inbound IP packets.
host < SA > — Specifies only inbound packets from a single
IP address. Use this option when you want to match only the
IP packets from one source IP address.
SA/mask-length or SA < mask > Specifies packets received
from an SA, where the SA is either a subnet or a group of IP
addresses. The mask can be in either dotted-decimal format
or CIDR format with the number of significant bits. Refer to
“Using CIDR Notation To Enter the ACL Mask” on page 10-50.
Page view 361
1 2 ... 357 358 359 360 361 362 363 364 365 366 367 ... 595 596

Comments to this Manuals

No comments