IPv4 Access Control Lists (ACLs)
Planning an ACL Application
■
Generally, you should list ACEs from the most specific (individual
hosts) to the most general (subnets or groups of subnets) unless doing
so permits traffic that you want dropped. For example, an ACE
allowing a small group of workstations to use a specialized printer
should occur earlier in an ACL than an entry used to block widespread
access to the same printer.
IPv4 ACL Configuration and Operating Rules
■
Static Port ACLs:
A static port ACL filters traffic entering the switch
on the port(s) or trunk(s) to which it is assigned.
■
Per Switch ACL Limits for All ACL Types.
At a minimum an ACL
must have one, explicit “permit” or “deny” Access Control Entry. You
can configure up to 512 ACLs. For IPv4 ACLs, the maximums are as
follows:
•
Named (Extended or Standard) ACLs: Up to 512 (minus any numeric
standard or extended ACL assignments)
•
Numeric Standard ACLs: Up to 99; numeric range: 1 - 99
•
Numeric Extended ACLs: Up to 100; numeric range: 100 - 199
•
The maximum number of ACEs supported by the switch is up to 1024
for IPv4 ACEs. The maximum number of ACEs allowed on a port
depends on the concurrent resource usage by multiple configured
features. For more information, use the
show < qos | access-list >
resources
command and/or refer to “Monitoring Shared Resources”
■
Implicit Deny:
In any static IPv4 ACL, the switch automatically
applies an implicit
deny ip any
that does not appear in
show
listings.
This means that the ACL denies any IPv4 packet it encounters that
does not have a match with an entry in the ACL. Thus, if you want an
ACL to permit any packets that you have not expressly denied, you
must enter a
permit any
or
permit ip any any
as the last ACE in an ACL.
Because, for a given packet the switch sequentially applies the ACEs
in an ACL until it finds a match, any packet that reaches the
permit any
or
permit ip any any
entry will be permitted, and will not encounter the
deny ip any
ACE the switch automatically includes at the end of the
ACL. For an example, refer to figure 9-4 on page 9-23. For Implicit
Deny operation in dynamic ACLs, refer to chapter 6, “Configuring
RADIUS Server Support for Switch Services”
9-27
Summary of Contents for PROCURVE 2910AL
Page 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Page 2: ......
Page 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Page 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Page 156: ...TACACS Authentication Operating Notes 4 30 ...
Page 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Page 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Page 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Page 592: ...12 Index ...
Page 593: ......