10-62
IPv4 Access Control Lists (ACLs)
Configuring Extended ACLs
Creating a Named, Extended ACL and/or Entering the “Named ACL”
(
nacl
) Context.
This command is a prerequisite to entering or editing ACEs
in a named, extended ACL. (For a summary of the extended ACL syntax
options, refer to table on page 10-59.)
Figure 10-17. Example of Entering the Named ACL Context
Syntax:
ip access-list extended <
name-str
>
Places the CLI in the “Named ACL” (
nacl
) context specified by
the
<
name-str
>
alphanumeric identifier. This enables entry of
individual ACEs in the specified ACL. If the ACL does not
already exist, this command creates it.
<
name-str
>:
Specifies an alphanumeric identifier for the ACL.
Consists of an alphanumeric string of up to 64 case-sensitive
characters. Including spaces in the string requires that you
enclose the string in single or double quotes. For example:
“
Accounting ACL
”. You can also use this command to access an
existing, numbered ACL. Refer to “Using the CLI To Edit ACLs”
on page 10-86
HP Switch(config)# ip access-list extended Sample-List
HP Switch(config-ext-nacl)#
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......