10-53
IPv4 Access Control Lists (ACLs)
Configuring Standard ACLs
Configuring ACEs in an Named, Standard ACL.
Configuring ACEs is
done after using the
ip access-list standard <
name-str
>
command described
above to enter the “Named ACL” (
nacl
) context of an access list.
For a
standard ACL syntax summary, refer to table on page 10-50.
Syntax:
< deny | permit >
< any | host <
SA
> |
SA
<mask |
SA
/
mask-length
>> [log]
Executing this command appends the ACE to the end of the list
of ACEs in the current ACL. In the default ACL configuration,
ACEs are automatically assigned consecutive sequence num-
bers in increments of 10 and can be renumbered using
resequence
Note:
To insert a new ACE between two existing ACEs, precede
deny
or
permit
with an appropriate sequence number. (Refer to
“Inserting an ACE in an Existing ACL” on page 10-88.)
< deny | permit >
For named ACLs, used in the “Named ACL” (
nacl
) context to
configure an ACE. Specifies whether the ACE denies or permits
a packet matching the criteria in the ACE, as described below.
< any | host <
SA
> |
SA
<
mask
> |
SA
/
mask-length
>
Defines the source IPv4 address (SA) a packet must carry for
a match with the ACE.
•
any
— Allows IPv4 packets from any SA.
•
host <
SA
> —
Specifies only packets having
<
SA
>
as the
source. Use this criterion when you want to match the IPv4
packets from a single source address.
•
SA
<
mask
>
or
SA
/
mask-length
—
Specifies packets received
from either a subnet or a group of IPv4 addresses. The mask
format can be in either dotted-decimal format or CIDR
format (number of significant bits). (Refer to “Using CIDR
Notation To Enter the IPv4 ACL Mask” on page 10-49).
Mask Application:
The mask is applied to the IPv4 address
in the ACE to define which bits in a packet’s SA must exactly
match the SA configured in the ACE and which bits need not
match. For example:
10.10.10.1/24
and
10.10.10.1 0.0.0.255
both
define any address in the range of 10.10.10.(1 - 255).
Note:
Specifying a group of contiguous addresses may
require more than one ACE. For more on how masks operate,
refer to “How an ACE Uses a Mask To Screen Packets for
Matches” on page 10-35.
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......