IPv4 Access Control Lists (ACLs)
Planning an ACL Application
■
Generally, you should list ACEs from the most specific (individual
hosts) to the most general (subnets or groups of subnets) unless doing
so permits traffic that you want dropped. For example, an ACE
allowing a small group of workstations to use a specialized printer
should occur earlier in an ACL than an entry used to block widespread
access to the same printer.
IPv4 ACL Configuration and Operating Rules
■
Static Port ACLs:
A static port ACL filters traffic entering the switch
on the port(s) or trunk(s) to which it is assigned.
■
Per Switch ACL Limits for All ACL Types.
At a minimum an ACL
must have one, explicit “permit” or “deny” Access Control Entry. You
can configure up to 512 ACLs. For IPv4 ACLs, the maximums are as
follows:
•
Named (Extended or Standard) ACLs: Up to 512 (minus any numeric
standard or extended ACL assignments)
•
Numeric Standard ACLs: Up to 99; numeric range: 1 - 99
•
Numeric Extended ACLs: Up to 100; numeric range: 100 - 199
•
The maximum number of ACEs supported by the switch is up to 1024
for IPv4 ACEs. The maximum number of ACEs allowed on a port
depends on the concurrent resource usage by multiple configured
features. For more information, use the
show < qos | access-list >
resources
command and/or refer to “Monitoring Shared Resources”
■
Implicit Deny:
In any static IPv4 ACL, the switch automatically
applies an implicit
deny ip any
that does not appear in
show
listings.
This means that the ACL denies any IPv4 packet it encounters that
does not have a match with an entry in the ACL. Thus, if you want an
ACL to permit any packets that you have not expressly denied, you
must enter a
permit any
or
permit ip any any
as the last ACE in an ACL.
Because, for a given packet the switch sequentially applies the ACEs
in an ACL until it finds a match, any packet that reaches the
permit any
or
permit ip any any
entry will be permitted, and will not encounter the
deny ip any
ACE the switch automatically includes at the end of the
ACL. For an example, refer to figure 9-4 on page 9-23. For Implicit
Deny operation in dynamic ACLs, refer to chapter 6, “Configuring
RADIUS Server Support for Switch Services”
9-27
Содержание PROCURVE 2910AL
Страница 1: ...Access Security Guide ProCurve Switches W 14 03 2910al www procurve com ...
Страница 2: ......
Страница 3: ...HP ProCurve 2910al Switch February 2009 W 14 03 Access Security Guide ...
Страница 84: ...Configuring Username and Password Security Front Panel Security 2 36 ...
Страница 156: ...TACACS Authentication Operating Notes 4 30 ...
Страница 288: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup 8 22 ...
Страница 416: ...Configuring Advanced Threat Protection Using the Instrumentation Monitor 10 28 ...
Страница 516: ...Configuring Port Based and User Based Access Control 802 1X Messages Related to 802 1X Operation 12 76 ...
Страница 527: ...Configuring and Monitoring Port Security Port Security Figure 13 4 Examples of Show Mac Address Outputs 13 11 ...
Страница 572: ...Using Authorized IP Managers Operating Notes 14 14 ...
Страница 592: ...12 Index ...
Страница 593: ......
Страница 594: ... Copyright 2009 Hewlett Packard Development Company L P February 2009 Manual Part Number 5992 5439 ...