Brief Introduction to ACL
357
Configuration Procedure
In the following configurations, only the commands related to ACL configurations are
listed.
1
Define the work time range
Define time range from 8:00 to 18:00.
[SW5500]
time-range 3Com 8:00 to 18:00 working-day
2
Define the ACL to access the payment server.
a
Enter the numbered advanced ACL, number as 3000.
[SW5500]
acl number 3000 match-order config
b
Define the rules for other department to access the payment server.
[SW5500-acl-adv-3000]
rule 1 deny ip source any destination 129.110.1.2
0.0.0.0 time-range 3Com
c
Define the rules for the President’s Office to access the payment server.
[SW5500-acl-adv-3000]
rule 2 permit ip source 129.111.1.2 0.0.0.0
destination 129.110.1.2 0.0.0.0
3
Activate ACL.
Activate the ACL 3000.
[SW5500-GigabitEthernet1/0/50]
packet-filter inbound ip-group 3000
Basic ACL Configuration
Example
Networking Requirements
Using basic ACL, filter the packet whose source IP address is 10.1.1.1 during the time
range 8:00 ~ 18:00 every day. The host connects port GigabitEthernet1/0/50 of the
Switch.
Networking Diagram
Figure 89
Access Control Configuration Example
Configuration Procedure
In the following configurations, only the commands related to ACL configurations are
listed.
1
Define the time range
Define time range from 8:00 to 18:00.
[SW5500]
time-range 3Com 8:00 to 18:00 daily
2
Define the ACL for packet which source IP is 10.1.1.1.
a
Enter the number basic ACL, number as 2000.
Switch
#1
connect to Router
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...