10-44
IPv4 Access Control Lists (ACLs)
Configuring and Assigning an IPv4 ACL
Figure 10-11. Example of General Structure Options for an Extended ACL
ip access-list extended <
identifier
>
[ [
seq-#
] remark <
remark-str
>]
< permit | deny > <
ipv4-protocol-type
> <
SA
> <
src-acl-mask
> <
DA > <dest-acl-mask
>
< permit | deny > tcp
<
SA
> [<
operator
> <
value
>]
<
DA
> [<
operator
> <
value
>]
[established]
[ack | fin | rst | syn]
< permit | deny > udp
<
SA
> <
src-acl-mask
> [<
operator
> <
port-id
>]
<
DA
> <
dest-acl-mask
> [<
operator
> <
port-id
>]
< permit | deny > icmp
<
SA
> <
src-acl-mask
> <
DA
> <
dest-acl-mask
> [
icmp-type
]
< permit | deny > igmp
<
SA
> <
SA-mask
> <
DA
> <
dest-acl-mask
> [
igmp-type
]
[ precedence <
priority
>]
[ tos <
tos-setting
>]
[log]
(Allowed only with “deny” ACEs.)
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......