Creating and Committing a Security ACL
381
The simplest security ACL permits or denies packets from a source IP
address:
set security acl ip
acl-name
{
permit
[
cos
cos
] |
deny
}
source-ip-addr
mask |
any
}
[
before
editbuffer-index
|
modify
editbuffer-index
] [
hits
]
For example, to create ACL
acl-1
that permits all packets from IP address
192.168.1.4, type the following command:
WX1200#
set security acl ip acl-1 permit 192.168.1.4 0.0.0.0
With the following basic security ACL command, you can specify any of
the protocols supported by MSS:
set security acl ip
acl-name
{
permit
[
cos
cos
] |
deny
}
{
protocol-number
} {
source-ip-addr
mask |
any
}
[[
precedence
precedence
] [
tos
tos
] [
dscp
codepoint
]] [
before
editbuffer-index
|
modify
editbuffer-index
] [
hits
]
The following sample security ACL permits all Generic Routing
Encapsulation (GRE) packets from source IP address 192.168.1.11 to
destination IP address 192.168.1.15, with a precedence level of 0
(routine), and a type-of-service (TOS) level of 0 (normal). (For more
information about type-of-service and precedence levels, see the
Wireless
LAN Switch and Controller Command Reference
.) GRE is protocol number
47.
WX1200#
set security acl ip acl-2 permit cos 2 47
192.168.1.11 0.0.0.0 192.168.1.15 0.0.0.0 precedence 0 tos 0
hits
The security ACL
acl-2
described above also applies the CoS level 2
(medium priority) to the permitted packets. (For CoS details, see “Class of
Service” on page 382.) The keyword
hits
counts the number of times this
ACL affects packet traffic.
Table 30 lists common IP protocol numbers. (For a complete list of IP
protocol names and numbers, see
www.iana.org/assignments/protocol-numbers
.) For commands that set
security ACLs for specific protocols, see the following information:
“Setting an ICMP ACL” on page 383
“Setting a TCP ACL” on page 385
“Setting a UDP ACL” on page 386
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...