26
IP F
ILTERS
C
OMMANDS
Overview
This section describes the IP Filters commands accessible from the CLI. IP filters are
used in IP networks that cross organizational or corporate boundaries. They
control inter-network data transmission by accepting or rejecting passage of
specific packets through network interfaces based on information in the packet
header.
IP filtering provides a form of tunnel access control. IP filters can also be used with
LAN and PVC interfaces.
IP Filter
Components
Each IP filter consists of:
A default action to take when an IP packet does not match any of the rules
specified for the IP filter.
A set of rules that determine which IP packets may access a network interface.
Before an IP packet is transmitted onto a network interface, IP filtering analyzes
the packet header information using the set of rules added to the filter specified
for the interface. Based on the rules, the packet is either accepted or discarded.
IP filtering is performed based on the first matching rule that is found. IP filtering
searches for a matching rule in rule number order. For this reason, you should
order your rules so that the rules you expect to be matched most often have the
lowest rule numbers. This will reduce the time spent in IP filtering.
Refer to the
Packet Filters
chapter for more information on filters, including
sample filter files.
CLI Commands
The following table identifies the IP Filters commands described in this chapter.
Command
Type
Command Name
Add
add ip filter <ip_filter_name>
default_action
[accept | reject]
add ip rule
<number>
Delete
delete ip filter
<ip_filter_name>
delete ip rule
<number>
filter
<ip_filter_name>
List
list ip filters
Summary of Contents for OfficeConnect 3C100XF
Page 1: ...http www 3com com OfficeConnect Gateway CLI User s Guide Release 1 0 Part No 10042302 Rev AA ...
Page 14: ...xiv ...
Page 18: ...iv ABOUT THIS GUIDE ...
Page 30: ...1 12 CHAPTER 1 USING THE COMMAND LINE INTERFACE CLI ...
Page 50: ...3 14 CHAPTER 3 ADMINISTRATIVE CLI COMMANDS ...
Page 58: ...4 8 CHAPTER 4 CONFIGURING AND MANAGING USERS ...
Page 70: ...6 8 CHAPTER 6 BRIDGING COMMANDS ...
Page 78: ...8 4 CHAPTER 8 INTERFACE COMMANDS ...
Page 82: ...9 4 CHAPTER 9 ARP COMMANDS ...
Page 88: ...11 4 CHAPTER 11 DHCP COMMANDS ...
Page 124: ...12 36 CHAPTER 12 IP ROUTING COMMANDS ...
Page 134: ...13 10 CHAPTER 13 DNS COMMANDS ...
Page 142: ...15 6 CHAPTER 15 MULTICASTING AND IGMP COMMANDS ...
Page 160: ...17 8 CHAPTER 17 PPP COMMANDS ...
Page 182: ...21 6 CHAPTER 21 ADDRESS TRANSLATION COMMANDS ...
Page 186: ...22 4 CHAPTER 22 IPSEC COMMANDS ...
Page 188: ...23 2 CHAPTER 23 SECURITY ASSOCIATION SA COMMANDS ...
Page 192: ...24 4 CHAPTER 24 TCP COMMANDS ...
Page 204: ...25 12 CHAPTER 25 SNMP COMMANDS ...
Page 210: ...26 6 CHAPTER 26 IP FILTERS COMMANDS ...
Page 238: ...29 6 CHAPTER 29 TRACEROUTE COMMANDS ...
Page 255: ...xv RFC 1483 16 3 RFC 1483 MER 16 4 ...
Page 256: ...xvi ...
Page 260: ......