
1
2
3
4
5
6
7
Access Control Lists (ACLs) for the Series 3400cl and Series 6400cl Switches
Configuring and Assigning an ACL
ACL Configuration Factors
ACL Resource Consumption
Consumption of per-port rules and masks can be a significant factor in
switches using extensive ACL applications. In this case, resource usage takes
precedence over other factors when planning and configuring ACLs. For more
information on this topic, refer to “Planning an ACL Application on a Series
3400cl or Series 6400cl Switch” on page 10-16.
The Sequence of Entries in an ACL Is Significant
When the switch uses an ACL to determine whether to permit or deny a packet
on a particular interface, it compares the packet to the criteria specified in the
individual Access Control Entries (ACEs) in the ACL, beginning with the first
ACE in the list and proceeding sequentially until a match is found. When a
match is found, the switch applies the indicated action (permit or deny) to the
packet. This is significant because, once a match is found for a packet,
subsequent ACEs in the same ACL will not be used for that packet, regardless
of whether they match the packet.
For example, suppose that you have applied the ACL shown in figure 10-10 to
inbound traffic on port 10:
ip access-list extended "101"
deny ip 10.28.235.10 0.0.0.0 0.0.0.0 255.255.255.255
deny ip 10.28.245.89 0.0.0.0 0.0.0.0 255.255.255.255
permit tcp 10.28.18.100 0.0.0.0 10.28.237.1 0.0.0.0
deny tcp 10.28.18.100 0.0.0.0 0.0.0.0 255.255.255.255
permit ip 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255
exit
Source and
Destination
IP Addresses
for the ACE in
line 4 of the
ACL.
Following the last explicit ACE in the ACL there is always an implicit “deny
any”. However, in this case it will not be used because the last, explicit
permit statement allows all IP packets that earlier ACEs have not already
permitted or denied.
Source
Destination
Figure 10-13. Example of a Standard ACL that Permits All Traffic Not Implicitly Denied
10-39
Summary of Contents for 6400cl
Page 2: ......
Page 84: ...Static Virtual LANs VLANs VLAN Restrictions This page is intentionally unused 2 54 ...
Page 104: ...GVRP GVRP Operating Notes This page intentionally unused 3 20 ...
Page 274: ...Switch Meshing Operating Notes for Switch Meshing This page is intentionally unused 7 28 ...
Page 662: ... This page is intentionally unused 20 Index ...
Page 663: ......