10-64
IPv4 Access Control Lists (ACLs)
Configuring Extended ACLs
< ip |
ip-protocol
|
ip-protocol-nbr
>
Used after
deny
or
permit
to specify the packet protocol type
required for a match. An extended ACL must include one of
the following:
•
ip
—
any IPv4 packet.
•
ip-protocol
—
any one of the following IPv4 protocol names:
ip-in-ip
ipv6-in-ip gre
esp
ah
ospf
pim
vrrp
sctp
tcp*
udp*
icmp*
igmp*
•
ip-protocol-nbr
—
the protocol number of an IPv4 packet type,
such as “8” for Exterior Gateway Protocol or 121 for Simple
Message Protocol. (For a listing of IPv4 protocol numbers
and their corresponding protocol names, refer to the IANA
“Protocol Number Assignment Services” at
www.iana.com.) (Range: 0 - 255)
*
For TCP, UDP, ICMP, and IGMP, additional criteria can be
specified, as described on pages 10-67 through 10-72.
< any | host <
SA
> |
SA < mask
> |
SA/ mask-length
This is the first instance of IPv4 addressing in an extended
ACE. It follows the protocol specifier and defines the source
address (SA) a packet must carry for a match with the ACE.
•
any
—
Allows IPv4 packets from any SA.
•
host
<
SA
> —
Specifies only packets having a single address
as the SA. Use this criterion when you want to match only
the IPv4 packets from a single SA.
•
SA < mask >
or
SA
/
mask-length
—
Specifies packets received
from an SA, where the SA is either a subnet or a group of
addresses. The mask can be in either dotted-decimal format
or CIDR format (number of significant bits). Refer to
“Using CIDR Notation To Enter the IPv4 ACL Mask” on page
10-49.
SA Mask Application:
The mask is applied to the SA in the
ACL to define which bits in a packet’s SA must exactly
match the SA configured in the ACL and which bits need
not match.
Example:
10.10.10.1/24 and 10.10.10.1 0.0.0.255 both
define any address in the range of 10.10.10.(1 - 255).
Note:
Specifying a group of contiguous addresses may
require more than one ACE. For more on how masks operate
in ACLs, refer to “How an ACE Uses a Mask To Screen
Packets for Matches” on page 10-35.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......