Supermicro SSE-F3548S/SSE-F3548SR Configuration User’s Guide
237
SMIS(config-std-nacl)# permit host 172.20.20.1 host 172.100.0.1
Then create the deny rule for the subnet 172.20.0.0.
SMIS# configure terminal
SMIS(config)# ip access-list standard acl_1b
SMIS(config-std-nacl)# deny 172.20.0.0 255.255.0.0 172.100.0.0 255.255.0.0
ACL 2 Configuration
SMIS# configure terminal
SMIS(config)# ip access-list standard 2
SMIS(config-std-nacl)# redirect fx 0/1 any 172.10.0.0 255.255.0.0
8.3.9
IP Extended ACLs
Supermicro switches support 128 IP ACLs, which includes both IP Standard and IP Extended ACLs.
Users can define IP Extended ACLs with deny, permit or redirect action rules. An IP Extended ACL can be
defined only with one rule.
There is no implied deny all rule in Supermicro switch ACLs. By default, all packets not
matching a configured ACL rule will be forwarded automatically. For any traffic to be denied,
it has to be configured with an explicit deny rule.
The permit rule is widely used for QoS applications. In some cases permit rules are useful when all traffic
is denied by a rule and a few specific hosts are to be permitted. IP Extended ACLs allow users to configure
traffic flow with the following fields.
IP - Protocol, Source IP Address, Destination IP Address, Type Of Service (TOS), DSCP
TCP – Source Port, Destination Port, TCP message type – acknowledgement / reset
UDP – Source Port, Destination Port
ICMP – Message Type, Message Code
IP Extended ACL rules can be created and identified either a with an ACL number such as 1,2 or 3 or with a
name string. ACL identifier numberscan be any number from 1 to 65535. ACL identifier namescan be any
string length not exceeding 32 characters.
IP Standard ACLs and IP Extended ACLs share the ACL numbers and names. Hence ACL
numbers and names across all IP Standard and IP Extended ACLs have to be unique. In other
words, the same ACL number or name cannot be used for both IP Standard ACLs and IP
Extended ACLs.
User can associatepriority values to IP Extended ACL rules. Based on the configured priority, the rules will
be orderly arranged on the hardware ACL table. The ACL rules are checked on the incoming packets based
on the order of priority. The higher priority ACL rules takes precedence over the lower priority rules. In