10-75
IPv4 Access Control Lists (ACLs)
Configuring Extended ACLs
Creating or Adding to an Extended, Numbered ACL.
This command is
an alternative to using
ip access-list extended <
name-str
>
and does not use the
Named ACL (
nacl
) context. (For an extended ACL syntax summary, refer to
table on page 10-59.)
Syntax:
access-list < 100-199 > < deny | permit > < ip |
ip-protocol
|
ip-protocol-nbr
>
< any | host <
SA
> |
SA
/
mask-length
| SA <
mask
>>
< any | host <
DA
> |
DA
/mask-length | DA < mask >>
[ precedence < 0 - 7 |
precedence-name
>]
[ tos <
tos-bit-setting
>
[ log ]
If the ACL does not already exist, this command creates the
specified ACL and its first ACE. If the ACL already exists,
the new ACE is appended to the end of the configured list of
explicit ACEs. In the default configuration, the ACEs in an
ACL will automatically be assigned consecutive sequence
numbers in increments of 10 and can be renumbered with
resequence
(page 10-91).
Note:
To insert a new ACE between two existing ACEs in
an extended, numbered ACL:
a.
Use
ip access list extended < 100 - 199 >
to open the
ACL as a named ACL.
b.
Enter the desired sequence number along with the
ACE statement you want.
(Refer to the “Numbered ACLs” list item on page 10-48.)
For a match to occur, a packet must have the source and
destination addressing criteria specified in the ACE, as
well as:
• the protocol-specific criteria configured in the ACE,
including any included, optional elements (described
later in this section)
• any (optional) precedence and/or ToS settings
configured in the ACE
< 100-199 >
Specifies the ACL ID number. The switch interprets a
numeric ACL with a value in this range as an extended
ACL.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......