Chapter 67: Advanced Access Control Lists (ACLs)
1030
Section X: Network Management
Note
In the example, the permit ACL is added to the port
before
the deny
ACL. This is important because packets are compared against the
ACLs in the order in which the ACLs are added to the port. If the
deny ACL is added first, the port blocks all traffic, even the traffic
specified by the permit ACL.
For another example of permit ACLs, see Table 111. In this example,
ports 21 and 22 forward traffic from three specified network devices and
discard all other ingress traffic. The allowed traffic is specified with three
permit ACLs.
Note
The permit ACLS are added to the ports before the deny ACL to
ensure that packets are compared against them first.
Table 110. Creating a Permit ACL Followed by a Deny ACL Example
Command
Description
awplus> enable
Enter the Privileged Executive mode
from the User Executive mode.
awplus# configure terminal
Enter the Global Configuration mode.
awplus(config)
#
access-list 3015 permit ip
149.55.65.0/24 any
Create the permit ACL with the
ACCESS-LIST command.
awplus(config)
#
access-list 3011 deny ip
any any
Create the deny ACL.
awplus(config)
#
interface port1.0.15
Move to the Port Interface mode for
port 15.
awplus(config_if)
#
access-group 3015
awplus(config_if)
#
access-group 3011
Add the two ACLs to the port with the
ACCESS-GROUP command, being
sure to add the permit ACL first so
that ingress packets are compared
against it first.
awplus(config_if)
#
end
Return to the Privileged Exec mode.
awplus# show access-list
Confirm the configuration of the
ACLs.
awplus# show interface port1.0.15 access-
group
Confirm that the ACLs has been
added to the port.
Summary of Contents for AT-9000/28
Page 4: ......
Page 26: ...Contents 26...
Page 30: ...Tables 30...
Page 36: ...36 Section I Getting Started...
Page 70: ...Chapter 2 Starting a Management Session 70 Section I Getting Started...
Page 96: ...96 Section II Basic Operations...
Page 142: ...Chapter 6 Basic Switch Management Commands 142 Section II Basic Operations...
Page 220: ...Chapter 9 IPv4 and IPv6 Management Addresses 220 Section II Basic Operations...
Page 244: ...Chapter 10 IPv4 and IPv6 Management Address Commands 244 Section II Basic Operations...
Page 264: ...Chapter 12 SNTP Client Commands 264 Section II Basic Operations...
Page 298: ...Chapter 15 Enhanced Stacking 298 Section II Basic Operations...
Page 312: ...Chapter 16 Enhanced Stacking Commands 312 Section II Basic Operations...
Page 318: ...Chapter 17 Port Mirror 318 Section II Basic Operations...
Page 324: ...Chapter 18 Port Mirror Commands 324 Section II Basic Operations Example awplus show mirror...
Page 350: ...Chapter 21 Multicast Commands 350 Section II Basic Operations...
Page 352: ...352 Section III File System...
Page 360: ...Chapter 22 File System 360 Section III File System...
Page 383: ...AT 9000 Switch Command Line User s Guide Section III File System 383 Example awplus show boot...
Page 386: ...Chapter 25 Boot Configuration File Commands 386 Section III File System...
Page 398: ...Chapter 26 File Transfers 398 Section III File System...
Page 406: ...Chapter 27 File Transfer Commands 406 Section III File System...
Page 408: ...408 Section IV Event Messages...
Page 430: ...Chapter 30 Syslog Client 430 Section IV Event Messages...
Page 438: ...438 Section V Port Trunks...
Page 448: ...Chapter 32 Static Port Trunks 448 Section V Port Trunks...
Page 480: ...480 Section VI Spanning Tree Protocols...
Page 520: ...Chapter 38 STP Commands 520 Section VI Spanning Tree Protocols...
Page 558: ...558 Section VII Virtual LANs...
Page 600: ...Chapter 42 Port based and Tagged VLAN Commands 600 Section VII Virtual LANs...
Page 634: ...Chapter 44 GARP VLAN Registration Protocol Commands 634 Section VII Virtual LANs...
Page 670: ...Chapter 47 Private Port VLANs 670 Section VII Virtual LANs...
Page 692: ...Chapter 50 VLAN Stacking 692 Section VII Virtual LANs...
Page 698: ...Chapter 51 VLAN Stacking Commands 698 Section VII Virtual LANs...
Page 700: ...700 Section VIII Port Security...
Page 748: ...Chapter 54 802 1x Port based Network Access Control 748 Section VIII Port Security...
Page 790: ...Chapter 55 802 1x Port based Network Access Control Commands 790 Section VIII Port Security...
Page 792: ...792 Section IX Simple Network Management Protocols...
Page 804: ...Chapter 56 SNMPv1 and SNMPv2c 804 Section X Simple Network Management Protocols...
Page 852: ...852 Section X Network Management...
Page 976: ...Chapter 63 Address Resolution Protocol ARP 976 Section X Network Management...
Page 1090: ...1090 Section XI Management Security...
Page 1114: ...Chapter 71 Telnet Server 1114 Section XI Management Security...
Page 1122: ...Chapter 73 Telnet Client 1122 Section XI Management Security...
Page 1126: ...Chapter 74 Telnet Client Commands 1126 Section XI Management Security...
Page 1138: ...Chapter 75 Secure Shell SSH Server 1138 Section XI Management Security...
Page 1158: ...Chapter 78 Non secure HTTP Web Browser Server Commands 1158 Section XI Management Security...
Page 1186: ...Chapter 80 Secure HTTPS Web Browser Server Commands 1186 Section XI Management Security...
Page 1202: ...Chapter 81 RADIUS and TACACS Clients 1202 Section XI Management Security...
Page 1230: ...Chapter 82 RADIUS and TACACS Client Commands 1230 Section XI Management Security...