92
Summit24e3 Switch Installation and User Guide
Access Policies
Routing Access Policies
Routing access policies are used to control the advertisement or recognition of routing protocols, such as
RIP or OSPF. Routing access policies can be used to ‘hide’ entire networks, or to trust only specific
sources for routes or ranges of routes. The capabilities of routing access policies are specific to the type
of routing protocol involved, but are sometimes more efficient and easier to implement than access lists.
Using Access Control Lists
Each access control list consists of an access mask that selects which fields of each incoming packet to
examine, and a list of values to compare with the values found in the packet. Access masks can be
shared multiple access control lists, using different lists of values to examine packets. The following
sections describe how to use access control lists.
Access Masks
There are between twelve and fourteen access masks available in the Summit24e3, depending on which
features are enabled on the switch. Each access mask is created with a unique name and defines a list of
fields that will be examined by any access control list that uses that mask (and by any rate limit that
uses the mask).
An access mask consists of a combination of the following thirteen fields:
•
Ethernet destination MAC address
•
Ethernet source MAC address
•
VLANid
•
IP Type of Service (TOS) or DiffServ code point
•
Ethertype
•
IP protocol
•
IP destination address and netmask
•
Layer 4 destination port
•
IP source address and netmask
•
Layer 4 source port, or ICMP type and/or ICMP code
•
TCP session initiation bits (permit-established keyword)
•
Egress port
•
Ingress ports
An access mask can also have an optional, unique precedence number associated with it.
Access Lists
Each entry that makes up an access list contains a unique name and specifies a previously created
access mask. The access list also includes a list of values to compare with the incoming packets, and an
action to take for packets that match. When you create an access list, you must specify a value for each
of the fields that make up the access mask used by the list.
For packets that match a particular access control list, you can specify the following actions:
Содержание Summit Summit24
Страница 12: ...12 Contents Summit24e3 Switch Installation and User Guide Index Index of Commands ...
Страница 14: ...14 Figures Summit24e3 Switch Installation and User Guide ...
Страница 24: ...24 Summit24e3 Switch Installation and User Guide Summit24e3 Switch Overview ...
Страница 32: ...32 Summit24e3 Switch Installation and User Guide Switch Installation ...
Страница 78: ...78 Summit24e3 Switch Installation and User Guide Configuring Ports on a Switch ...
Страница 118: ...118 Summit24e3 Switch Installation and User Guide Network Address Translation NAT ...
Страница 132: ...132 Summit24e3 Switch Installation and User Guide Ethernet Automatic Protection Switching ...
Страница 146: ...146 Summit24e3 Switch Installation and User Guide Quality of Service QoS ...
Страница 158: ...158 Summit24e3 Switch Installation and User Guide Status Monitoring and Statistics ...
Страница 204: ...204 Summit24e3 Switch Installation and User Guide Interior Gateway Routing Protocols ...
Страница 212: ...212 Summit24e3 Switch Installation and User Guide Safety Information ...
Страница 216: ...216 Summit24e3 Switch Installation and User Guide Supported Standards ...
Страница 238: ...238 Index Summit24e3 Switch Installation and User Guide ...
Страница 244: ...244 Index of Commands Summit24e3 Switch Installation and User Guide ...