10-61
IPv4 Access Control Lists (ACLs)
Configuring Extended ACLs
Configuring Named, Extended ACLs
For a match to occur with an ACE in an extended ACL, a packet must have
the source and destination address criteria specified by the ACE, as well as
any IPv4 protocol-specific criteria included in the command.
Use the following general steps to create or add to a named, extended ACL:
1.
Create and/or enter the context of a named, extended ACL.
2.
Enter the first ACE in a new, extended ACL or append an ACE to the end
of an existing, extended ACL.
This section describes the commands for performing these steps. For other
ACL topics, refer to the following:
Topic
Page
configuring named, standard ACLs
configuring numbered, standard ACLs
configuring numbered, extended ACLs
applying or removing an ACL on an interface
deleting an ACL
editing an ACL
sequence numbering in ACLs
including remarks in an ACL
displaying ACL configuration data
creating or editing ACLs offline
enabling ACL “Deny” logging
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......