ProCurve 2610 Manual page 246

2610 / 2610-pwr series
Table of Contents

Advertisement

Access Control Lists (ACLs)
ACL Operation
N o t e o n I m p l i c i t
D e n y
Figure 9-3. The Packet-Filtering Process in an ACL with N Entries (ACEs)
9-14
For ACLs configured to filter inbound packets, note that Implicit Deny filters
any packets, including those with a DA specifying the switch itself. This
operation helps to prevent management access from unauthorized IP sources.
Test a packet against
criteria in first ACE.
Yes
Is there a
match?
No
Test the packet against
criteria in second ACE.
Yes
Is there a
match?
No
Test packet against
criteria in
th ACE.
N
Yes
Is there a
match?
No
Deny the packet
End
(invoke implicit
deny any).
For example, suppose you want to configure an ACL on the switch (with an
ID of "100") to invoke these policies:
1.
Permit all inbound traffic on port 12 sent from IP address 11.11.11.42.
Perform action
End
(permit or deny).
Perform action
End
(permit or deny).
Perform action
End
(permit or deny).
1. If a match is not found with
the first ACE in an ACL, the
switch proceeds to the next
ACE and so on.
2. If a match with an explicit
ACE is subsequently found,
the packet is either permit­
ted (forwarded) or denied
(dropped), depending on
the action specified in the
matching ACE. In this case
the switch ignores all sub­
sequent ACEs in the ACL.
3. If a match is not found with
any explicit ACE in the ACL,
the switch invokes the
implicit deny any at the end
of every ACL, and drops the
packet.
Note: If the list includes a
permit any entry, no
packets can reach the
implicit deny any at the end
of the list.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents