5-5
Cisco Global Site Selector Administration Guide
OL-10410-01
Chapter 5 Configuring Access Lists and Filtering GSS Traffic
Filtering GSS Traffic Using Access Lists
•
protocol
—Protocol for the traffic type. Recognized IP protocols include:
tcp
(Transmission Control Protocol),
udp
(User Datagram Protocol), and
icmp
(Internet Control Message Protocol).
•
source-address
—Network IP address from which the packet originated. The
GSS software uses the
source-address
and
source-netmask
arguments to
match the incoming packet to a source network.
•
source-netmask
—Subnet mask for the network from which the packet
originated. The software uses the
source-address
and
source-netmask
arguments to match the incoming packet to a source network.
•
host
—Identifies the host machine that is the source of the packet.
•
source-address
—IP address of the device that is the source of the packet.
•
any
—Identifies the wildcard value for the packet source. With
any
used in
place of the
source-address
,
source-netmask
,
or
host
source-address
values,
the GSS matches packets from all incoming sources.
•
operator
—Arbitrary bytes within the packet. The
operator
can be one of the
following values:
eq
(equal),
neq
(not equal),
range
(range)
•
port
—Source or destination port of the packet.
•
destination-port
—Compares the destination port of the packet with the
access condition.
For example, to configure an access list named
alist1
containing a rule that allows
any traffic using the TCP protocol on port 443 on the GSS device, enter the
following:
gss1.example.com#
config
gss1.example.com(config)#
access-list alist1 permit tcp any
destination-port eq 443
Use the
access-list
command for each access list that you intend to add to this
GSS device. See the
“Adding Rules to an Access List”
section for instructions
about adding more rules to an access list that already exists.
The following example shows a completed access list (alist1):
gss1.example.com(config)#
show access-list
access-list: alist1
access-list alist1 permit tcp any destination-port range 20 23
access-list alist1 permit tcp any eq 20
access-list alist1 permit tcp any eq 21