354
C
HAPTER
19: ACL C
ONFIGURATION
Table 363
Define Basic ACL
Define Advanced ACL
The rules of the classification for advanced ACL are defined on the basis of the
attributes such as source and destination IP address, the TCP or UDP port number in
use and packet priority to process the data packets. The advanced ACL supports the
analysis of three types of packet priorities, ToS (Type of Service), IP and DSCP priorities.
You can use the following command to define advanced ACL.
Perform the following configuration in the corresponding view.
Table 364
Define Advanced ACL
Note that, the
port1
and
port2
in the above command specify the TCP or UDP ports
used by various high-layer applications. For some common port numbers, you can use
the mnemonic symbols as a shortcut. For example, “bgp” can represent the TCP
number 179 used by BGP.
Define Layer-2 ACL
The rules of Layer-2 ACL are defined on the basis of the Layer-2 information such as
source MAC address, source VLAN ID, Layer-2 protocol type, Layer-2 packet format
and destination MAC address.
You can use the following command to define the numbered Layer-2 ACL.
Perform the following configuration in corresponding view.
Operation
Command
Enter basic ACL view (from System
View)
acl number
acl_number
[ match-order {
config | auto } ]
add a sub-item to the ACL (from
Basic ACL View)
rule [
rule_id
] { permit | deny } [
source {
source_addr wildcard
|
any } |
fragment | logging | time-range
name
]*
delete a sub-item from the ACL (from
Basic ACL View)
undo rule
rule_id
[ source | fragment |
logging | time-range ]*
Delete one ACL or all the ACL (from
System View)
undo acl { number
acl_number
| all }
Operation
Command
Enter advanced ACL view (from
System View)
acl number
acl_number
[ match-order { config
| auto } ]
Add a sub-item to the ACL (from
Advanced ACL View)
rule [
rule_id
] { permit | deny }
protocol
[
source {
source_addr wildcard
| any } ] [
destination {
dest_addr wildcard
| any } ] [
source-port
operator port1
[
port2
] ] [
destination-port
operator port1
[
port2
] ] [
icmp-type
type code
] [ established ] [ [ {
precedence
precedence
tos
tos
| dscp
dscp
}* |
vpn-instance
instance
] | fragment | logging
| time-range
name
]*
Delete a sub-item from the ACL
(from Advanced ACL View)
undo rule
rule_id
[ source | destination |
source-port | destination-port | icmp-type |
precedence | tos | dscp | fragment | logging
| time-range | vpn-instance ]*
Delete one ACL or all the ACL
(from System View)
undo acl { number
acl_number
| all }
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...