386
C
HAPTER
19: C
ONFIGURING
AND
M
ANAGING
S
ECURITY
ACL
S
For example, the following command permits packets sent from IP
address 192.168.1.5 to 192.168.1.6 with the TCP destination port equal
to 524, a precedence of 7, and a type of service of 15, on an established
TCP session, and counts the number of hits generated by the ACE:
WX1200#
set security acl ip acl-4 permit tcp
192.168.1.5 0.0.0.0 192.168.1.6 0.0.0.0 eq 524
precedence 7 tos 15 established hits
(For information about TOS and precedence levels, see the
Wireless LAN
Switch and Controller Command Reference
. For CoS details, see “Class of
Service” on page 382.)
Setting a UDP ACL
The following command filters UDP packets:
set security acl ip
acl-name
{
permit
[
cos
cos
] |
deny
}
udp
{
source-ip-addr mask |
any
[
operator port
[
port2
]]}
{
destination-ip-addr mask |
any
[
operator
port
[
port2
]]}
[[
precedence
precedence
] [
tos
tos
] [
dscp
codepoint
]] [
before
editbuffer-index
|
modify
editbuffer-index
] [
hits
]
For example, the following command permits UDP packets sent from IP
address 192.168.1.7 to IP address 192.168.1.8, with any UDP destination
port less than 65,535. It puts this ACE first in the ACL, and counts the
number of hits generated by the ACE.
WX1200#
set security acl ip acl-5 permit udp
192.168.1.7 0.0.0.0 192.168.1.8 0.0.0.0 lt 65535
precedence 7 tos 15 before 1 hits
(For information about TOS and precedence levels, see the
Wireless LAN
Switch and Controller Command Reference
. For CoS details, see “Class of
Service” on page 382.)
Determining the ACE
Order
The
set security acl
command creates a new entry in the edit buffer and
appends the new entry as a rule at the end of an ACL, unless you specify
otherwise. The order of ACEs is significant, because the earliest ACE
takes precedence over later ACEs. To place the ACEs in the correct order,
use the parameters
before
editbuffer-index
and
modify
editbuffer-index
. The first ACE is number 1.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...