10-110
IPv4 Access Control Lists (ACLs)
Creating or Editing ACLs Offline
In this example, the CLI would show the following output to indicate that
the ACL was successfully downloaded to the switch:
N o t e
If a transport error occurs, the switch does not execute the command and the
ACL is not configured.
Figure 10-41. Example of Using “copy tftp command-file” To Configure an ACL in the Switch
3.
In this example, the command to assign the ACL to a VLAN was included
in the .txt command file. If this is not done in your applications, then the
next step is to manually assign the new ACL to the intended VLAN.
vlan <
vid
> ip access-group <
identifier
> in
4.
You can then use the
show run
or
show access-list
config
command to
inspect the switch configuration to ensure that the ACL was properly
downloaded.
HP Switch(config)# copy tftp command-file 10.10.10.1 LIST-20-IN.txt pc
Running configuration may change, do you want to continue [y/n]? Y
1. ip access-list extended LIST-20-IN
3. ; CREATED ON JUNE 27
5. 10 remark "THIS ACE APPLIES INBOUND ON VLAN 20"
6. 10 permit tcp any host 10.10.20.98 eq http
7. 20 permit tcp any host 10.10.20.21 eq http
8. 30 deny tcp any 10.10.20.1/24 eq http
10. ; VLAN 20 SOURCES TO VLAN 10 DESTINATIONS.
12. 40 deny tcp host 10.10.20.17 host 10.10.10.100 eq telnet log
13. 50 deny tcp host 10.10.20.23 host 10.10.10.100 eq telnet log
14. 60 deny tcp host 10.10.20.40 host 10.10.10.100 eq telnet log
15. 70 permit ip 10.10.20.1/24 host 10.10.10.100
16. 80 remark "VLAN 30 POLICY."
17. 80 deny ip 10.10.30.1/24 host 10.10.10.100
18. 90 permit ip 10.10.30.1/24 10.10.10.1/24
19. exit
20. vlan 20 ip access-group "LIST-20-in" in
As illustrated here, blank lines in the
.txt
file in figure 10-39 cause breaks in the
displayed line-numbering sequence
when you copy the command file to the
switch. This is normal operation. (See
also figure 10-42 for the configuration
resulting from this output.)
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......