10-88
IPv4 Access Control Lists (ACLs)
Editing an Existing ACL
For example, to append a fourth ACE to the end of the ACL in figure 10-23:
Figure 10-25. Example of Appending an ACE to an Existing List
N o t e
When using the
access-list < 1 - 99 | 100 - 199 > < permit | deny > <
SA
>
command
to create an ACE for a numbered ACL, the ACE is always added to the end of
the current list and given the appropriate sequence number. However, once a
numbered list has been created, you can use the
ip access-list
command to
open it as a named ACL and specify a nondefault sequence number, as
described in the next section.
Inserting an ACE in an Existing ACL
This action uses a sequence number to specify where to insert a new ACE into
an existing sequence of ACLs.
HP Switch
(config)# ip access-list standard My-List
HP Switch(config-std-nacl)# permit any
HP Switch(config-std-nacl)# show run
.
.
.
ip access-list standard "My-List"
10 permit 10.10.10.25 0.0.0.0
20 permit 10.20.10.117 0.0.0.0
30 deny 10.20.10.1 0.0.0.255
40 permit 0.0.0.0 255.255.255.255
exit
Syntax:
ip access-list < standard | extended > <
name-str
| 1 - 99 | 100 - 199 >
<1-2147483647> < permit | deny > <
standard-acl
-
ip-criteria
> [ log ]
<1-2147483647> < permit | deny > <
extended-acl-ip-criteria
> [
options
]
The first command enters the “Named-ACL” context for the
specified ACL. The remaining two commands insert a new
ACE in a standard or extended ACL, respectively. (For details
on these criteria and options, refer to table , “Command
Summary for Standard IPv4 ACLs” —page 10-5, and table ,
“Command Summary for IPv4 Extended ACLs” —page 10-6.)
Note:
Entering an ACE that would result in an out-of-range
sequence number is not allowed. Use the resequence
command to free up ACE numbering availability in the
ACL. Refer to “Resequencing the ACEs in an ACL” on
page 10-91.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......