IPv4 Access Control Lists (ACLs)
Contents
Configuring and Assigning an IPv4 ACL
. . . . . . . . . . . . . . . . . . . . . . . 9-34
A Configured ACL Has No Effect Until You Apply It
You Can Assign an ACL Name or Number to an Interface
General Steps for Implementing ACLs . . . . . . . . . . . . . . . . . . . . . 9-34
Options for Permit/Deny Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-35
ACL Configuration Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-35
Standard ACL Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-36
Extended ACL Configuration Structure . . . . . . . . . . . . . . . . . . . . 9-37
ACL Configuration Factors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-39
The Sequence of Entries in an ACL Is Significant . . . . . . . . . . . . 9-39
Allowing for the Implied Deny Function . . . . . . . . . . . . . . . . . . . . 9-41
Even if the ACL Does Not Exist in the Switch’s Configuration . 9-41
Using the CLI To Create an ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-42
General ACE Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-42
Using CIDR Notation To Enter the IPv4 ACL Mask . . . . . . . . . . 9-43
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-44
Configuring Named, Standard ACLs . . . . . . . . . . . . . . . . . . . . . . . 9-46
Creating Numbered, Standard ACLs . . . . . . . . . . . . . . . . . . . . . . . 9-49
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-53
Configuring Named, Extended ACLs . . . . . . . . . . . . . . . . . . . . . . . 9-55
Configuring Numbered, Extended ACLs . . . . . . . . . . . . . . . . . . . . 9-65
Adding or Removing an ACL Assignment On an Interface
. . . . . . . 9-73
Filtering Inbound IPv4 Traffic Per Port . . . . . . . . . . . . . . . . . . . . . . . . 9-73
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-74
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-75
Using the CLI To Edit ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-75
General Editing Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-75
Sequence Numbering in ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-76
Inserting an ACE in an Existing ACL . . . . . . . . . . . . . . . . . . . . . . . 9-77
Deleting an ACE from an Existing ACL . . . . . . . . . . . . . . . . . . . . 9-79
Resequencing the ACEs in an ACL . . . . . . . . . . . . . . . . . . . . . . . . 9-80
Attaching a Remark to an ACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-81
Operating Notes for Remarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-84
9-2
Содержание PROCURVE 2910AL
Страница 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Страница 2: ......
Страница 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Страница 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Страница 156: ...TACACS Authentication Operating Notes 4 30 ...
Страница 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Страница 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Страница 516: ...Configuring Port Based and User Based Access Control 802 1X Messages Related to 802 1X Operation 12 76 ...
Страница 527: ...Configuring and Monitoring Port Security Port Security Figure 13 4 Examples of Show Mac Address Outputs 13 11 ...
Страница 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Страница 592: ...12 Index ...
Страница 593: ......
Страница 594: ... Copyright 2009 Hewlett Packard Development Company L P February 2009 Manual Part Number 5992 5439 ...