Chapter 8: Access Control List (Acl); Access Control List (Acl) Commands - Extreme Networks EAS 100-24t Switch CLI Manual

Layer 2 managed gigabit switch
Hide thumbs Also See for EAS 100-24t Switch CLI:
Table of Contents

Advertisement

Chapter 8: Access Control List (ACL)

Command
config access_profile profile_id
show access_profile
Access profiles allow users to establish criteria to determine whether or not the switch will forward
packets based on the information contained in each packet's header.
Creating an access profile is divided into two basic parts. First, an access profile must be created using
the create access_profile command. For example, if you want to deny all traffic to the subnet 10.42.73.0
to 10.42.73.255, you must first create an access profile that instructs the switch to examine all of the
relevant fields of each frame.
Create an access profile that uses IP addresses as the criteria for examination:
create access_profile ip source_ip_mask 255.255.255.0 profile_id 1
In the example above, we have created an access profile that will examine the IP field of each frame
received by the switch. Each source IP address the switch finds will be combined with the
source_ip_mask with a logical AND operation. The profile_id parameter is used to give the access
profile an identifying number - in this case, 1 – and it is used to assign a priority in case a conflict
occurs. The profile_id establishes a priority within the list of profiles. A lower profile_id gives the rule a
higher priority. In case of a conflict in the rules entered for different profiles, the rule with the highest
priority (lowest profile_id) will take precedence, except in the case when there are conflicts between the
packet content offset profile and other kinds of the ACL profile.
The deny parameter instructs the switch to filter any frames that meet the criteria - in this case, when a
logical AND operation between an IP address specified in the next step and the ip_source_mask match.
The default for an access profile on the switch is to permit traffic flow. If you want to restrict traffic, you
must use the deny parameter.
Now that an access profile has been created, you must add the criteria the switch will use to decide if a
given frame should be forwarded or filtered. We will use the config access_profile command to create a
new rule that defines the criteria we want. Let's further specify in the new rule to deny access to a
range of IP addresses through an individual port: In this example, we want to filter any packets that
228
Parameters
<value 1-256> [add access_id [auto_assign | <value 1-65535>] [ethernet {[vlan
<vlan_name 32> | vlan_id <vid> {mask <hex 0x0-0x0fff>}] | source_mac
<macaddr> {mask <macmask>} | destination_mac <macaddr> {mask
<macmask>} | 802.1p <value 0-7> | ethernet_type <hex 0x0-0xffff>}(1) | ip
{[vlan <vlan_name 32> | vlan_id <vid> {mask <hex 0x0-0x0fff>}] | source_ip
<ipaddr> {mask <netmask>} | destination_ip <ipaddr> {mask <netmask>} |
dscp <value 0-63> | [icmp {type <value 0-255> | code <value 0-255>} | igmp
{type <value 0-255>} | tcp {src_port <value 0-65535> {mask <hex 0x0-0xffff>} |
dst_port <value 0-65535> {mask <hex 0x0-0xffff>} | flag [all | {urg | ack | psh |
rst | syn | fin}]} | udp {src_port <value 0-65535> {mask <hex 0x0-0xffff>} |
dst_port <value 0-65535> {mask <hex 0x0-0xffff>}} | protocol_id <value 0-
255>]}(1) | ipv6 {class <value 0-255> | flowlabel <hex 0x0-0xfffff> |
source_ipv6 <ipv6addr> {mask <ipv6mask>} | [tcp {src_port <value 0-65535>
{mask <hex 0x0-0xffff>} | dst_port <value 0-65535> {mask <hex 0x0-
0xffff>}}(1) | udp {src_port <value 0-65535> {mask <hex 0x0-0xffff>} | dst_port
<value 0-65535> {mask <hex 0x0-0xffff>}}]} | packet_content {offset1 <hex
0x0-0xffffffff> {mask <hex 0x0-0xffffffff>} | offset2 <hex 0x0-0xffffffff> {mask
<hex 0x0-0xffffffff>} | offset3 <hex 0x0-0xffffffff> {mask <hex 0x0-0xffffffff>}|
offset4 <hex 0x0-0xffffffff> {mask <hex 0x0-0xffffffff>} | } ] port [<portlist> | all ]
[ permit{ priority <value 0-7> {replace_priority} | replace_dscp_with <value 0-
63> | counter [enable | disable] }|deny|mirror ] | delete access_id <value 1-
65535> ]
{profile_id <value 1-256>}
Extreme Networks EAS 100-24t Switch CLI Manual

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents