10-93
IPv4 Access Control Lists (ACLs)
Editing an Existing ACL
Note
After a numbered ACL has been created (using
access-list < 1 - 99 | 100 - 199 >
),
it can be managed as either a named or numbered ACL. For example, in an
existing ACL with a numeric identifier of “115”, either of the following com-
mand sets adds an ACE denying IPv4 traffic from any source to a host at
10.10.10.100:
HP Switch(config)# access-list 115 deny ip host
10.10.10.100
HP Switch(config)# ip access-list extended 115
HP Switch(config-ext-nacl)# deny ip any 10.10.10.100
Appending Remarks and Related ACEs to the End of an ACL.
To
include a remark for an ACE that will be appended to the end of the current
ACL, enter the remark first, then enter the related ACE. This results in the
Syntax:
ip access-list < standard | extended > <
name-str
| 1-99 | 100-199 >
[
seq-#
] remark <
remark-str
>
no <
seq-#
> remark
This syntax applies to both named and numbered ACLs. With-
out an optional sequence number, the remark is appended to
the end of the list and automatically assigned a sequence
number. When entered with an optional sequence number, the
remark is inserted in the list according to the numeric prece-
dence of the sequence number. The
no
form of the command
deletes the indicated remark, but does not affect the related
ACE.
To associate a remark with a specific ACE, enter the remark first,
and then enter the ACE.
– Entering a remark without a sequence number and then
entering an ACE without a sequence number results in the
two entries being automatically paired with the same
sequence number and appended to the end of the current ACL.
– Entering a remark with a sequence number and then
entering an ACE with the same sequence number results in
the two entries being paired together and positioned in the
list according to the sequence number they share.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......