358
C
HAPTER
19: ACL C
ONFIGURATION
[SW5500]
acl number 2000
b
Define the rules for packet which source IP is 10.1.1.1.
[SW5500-acl-basic-2000]
rule 1 deny source 10.1.1.1 0 time-range 3Com
3
Activate ACL.
Activate the ACL 2000.
[SW5500-GigabitEthernet1/0/50]
packet-filter inbound ip-group 2000
Link ACL Configuration
Example
Networking Requirements
Using Link ACL, filter the packet whose source MAC address is 00e0-fc01-0101 and
destination MAC address is 00e0-fc01-0303 during the time range 8:00 ~ 18:00
every day. The ACL is activated on GigabitEthernet1/0/50.
Networking Diagram
Figure 90
Access Control Configuration Example
Configuration Procedure
In the following configurations, only the commands related to ACL configurations are
listed.
1
Define the time range
Define time range from 8:00 to 18:00.
[SW5500]
time-range 3Com 8:00 to 18:00 daily
2
Define the ACL for the packet whose source MAC address is 00e0-fc01-0101 and
destination MAC address is 00e0-fc01-0303.
a
Enter the numbered link ACL, number as 4000.
[SW5500]
acl number 4000
b
Define the rules for the packet whose source MAC address is 00e0-fc01-0101 and
destination MAC address is 00e0-fc01-0303.
[SW5500-acl-ethernetframe-4000]
rule 1 deny source 00e0-fc01-0101
ffff-ffff-ffff source 00e0-fc01-0303 ffff-ffff-ffff time-range 3Com
3
Activate ACL.
Activate the ACL 4000 .
[SW5500-GigabitEthernet1/0/50]
packet-filter inbound link-group 4000
Switch
#1
connect to Router
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...