Chapter 33: Access Control Lists
STANDARD Revision 1.0
C4® CMTS Release 8.3 User Guide
© 2016 ARRIS Enterprises LLC. All Rights Reserved.
954
number 100, is created and named ACL_Egress_NACLs. Rules are added to ACL 100 to allow all 10.x.x.x hosts to connect to
167.206.9.0/8 and 167.206.7.171 using the port for TFTP:
configure access-list 1 name ACL_IBM
configure access-list 1 remark "In-Band Management"
configure access-list 1 permit any
configure access-list 100 name ACL_Egress_NACLs
configure access-list 100 permit udp 10.0.0.0 0.255.255.255 167.206.3.128 0.0.0.127 eq tftp
configure access-list 100 remark "Egress NACLs"
configure access-list 100 permit udp 10.0.0.0 0.255.255.255 167.206.9.0 0.0.0.255 eq tftp
configure access-list 100 permit udp 10.0.0.0 0.255.255.255 host 167.206.7.171 eq tftp
SNMP ACL
In the following example an access list named 99 includes all users having an IP address of 10.x.x.x. The second command
allows any source IP address from ACL 99 to use the community "public" to get MIB objects using SNMP:
configure access-list 99 10.0.0.0 0.255.255.255
configure snmp-server community public ro 99
Note: All SNMP traffic is filtered by SNMP community ACLs, if they are configured. If the cable-modem remote-query
feature is enabled and if the SNMP community used by that feature has an ACL configured, then that ACL should be
configured to allow the cable-modem subnets to pass; otherwise, the remote-query feature will not work.
IGMP ACLs
The C4/c CMTS does allow the IGMP default multicast group IP filter behavior to be overridden by applying an ACL to the
IGMP configured interface. Because the application of an ACL to an IGMP configured interface will override all of the
default IGMP group membership filters, an ACL rule must exist for any multicast sessions that the C4/c CMTS is expected to
permit or deny.
Note: The C4/c CMTS supports only standard ACLs for use as IGMP ACLs.
For a list of valid ranges, see