Access Lists (ACLs)
ExtremeWare XOS 11.3 Concepts Guide
262
can be applied to an interface, and the precedence of the ACLs is determined as they are being
configured. See
“Dynamic ACLs” on page 268
for information about creating dynamic ACLs.
ACL Policy File Syntax
An ACL policy file contains one or more rule entries. Each rule entry consists of:
●
a rule entry name, unique within the same ACL.
●
zero or more match conditions.
●
zero or one action (permit or deny). If no action is specified, the packet is permitted by default.
●
zero or more action modifiers.
Each rule entry in the file uses the following syntax:
entry <ACLrulename>{
if {
<match-conditions>;
} then {
<action>;
<action-modifiers>;
}
}
Here is an example of a rule entry:
entry udpacl {
if {
source-address 10.203.134.0/24;
destination-address 140.158.18.16/32;
protocol udp;
source-port 190;
destination-port 1200 - 1250;
} then {
permit;
}
}
ACL rule entries are evaluated in order, from the beginning of the file to the end, as follows:
●
If the packet matches all the match conditions, the action in the then statement is taken and the
evaluation process terminates.
●
For ingress ACLs, if a rule entry does not contain any match condition, the packet is considered to
match and the action in the rule entry’s then statement is taken and the evaluation process
terminates. For egress ACLs, if a rule entry does not contain any match condition, no packets will
match. See the section,
“Matching All Egress Packets”
for more information.
●
If the packet matches all the match conditions, and if there is no action specified in the then
statement, the action permit is taken by default.
●
If the packet does not match all the match conditions, the next rule entry in the ACL is evaluated.
●
This process continues until either the packet matches all the match conditions in one of the
subsequent rule entries or there are no more entries.
●
If a packet passes through all the rule entries in the ACL without matching any of them, it is
permitted.
Содержание ExtremeWare XOS 11.3
Страница 20: ...Contents ExtremeWare XOS 11 3 Concepts Guide 20...
Страница 25: ...1 Using ExtremeWare XOS...
Страница 26: ......
Страница 38: ...ExtremeWare XOS Overview ExtremeWare XOS 11 3 Concepts Guide 38...
Страница 58: ...Accessing the Switch ExtremeWare XOS 11 3 Concepts Guide 58...
Страница 146: ...Configuring Slots and Ports on a Switch ExtremeWare XOS 11 3 Concepts Guide 146...
Страница 218: ...Status Monitoring and Statistics ExtremeWare XOS 11 3 Concepts Guide 218...
Страница 240: ...Virtual LANs ExtremeWare XOS 11 3 Concepts Guide 240...
Страница 248: ...Virtual Routers ExtremeWare XOS 11 3 Concepts Guide 248...
Страница 278: ...Access Lists ACLs ExtremeWare XOS 11 3 Concepts Guide 278...
Страница 288: ...Routing Policies ExtremeWare XOS 11 3 Concepts Guide 288 entry deny_rest if then deny...
Страница 344: ...Security ExtremeWare XOS 11 3 Concepts Guide 344...
Страница 393: ...2 Using Switching and Routing Protocols...
Страница 394: ......
Страница 454: ...Spanning Tree Protocol ExtremeWare XOS 11 3 Concepts Guide 454...
Страница 484: ...Extreme Standby Router Protocol ExtremeWare XOS 11 3 Concepts Guide 484...
Страница 514: ...IPv4 Unicast Routing ExtremeWare XOS 11 3 Concepts Guide 514...
Страница 530: ...IPv6 Unicast Routing ExtremeWare XOS 11 3 Concepts Guide 530...
Страница 538: ...RIP ExtremeWare XOS 11 3 Concepts Guide 538...
Страница 556: ...OSPF ExtremeWare XOS 11 3 Concepts Guide 556...
Страница 566: ...OSPFv3 ExtremeWare XOS 11 3 Concepts Guide 566...
Страница 589: ...3 Appendixes...
Страница 590: ......
Страница 640: ...CNA Agent ExtremeWare XOS 11 3 Concepts Guide 640...
Страница 670: ...Glossary ExtremeWare XOS 11 3 Concepts Guide 670...
Страница 698: ...Index ExtremeWare XOS 11 3 Concepts Guide 698...