Applying Egress Layer 3 Acls (Control-Plane) - Dell S6100 Configuration Manual

On system
Hide thumbs Also See for S6100:
Table of Contents

Advertisement

Dell(conf-if-te-1/1/1/1)#show config
!
TenGigabitEthernet 1/1/1/1
no ip address
ip access-group abcd out
no shutdown
Dell(conf-if-te-1/1/1/1)#end
Dell#configure terminal
Dell(conf)#ip access-list extended abcd
Dell(config-ext-nacl)#permit tcp any any
Dell(config-ext-nacl)#deny icmp any any
Dell(config-ext-nacl)#permit 1.1.1.2
Dell(config-ext-nacl)#end
Dell#show ip accounting access-list
!
Extended Ingress IP access list abcd on gigethernet 0/0
seq 5 permit tcp any any
seq 10 deny icmp any any
seq 15 permit 1.1.1.2
Dell#configure terminal
Dell(conf)#interface te 1/1/2/1
Dell(conf-if-te-1/1/2/1)#ip vrf forwarding blue
Dell(conf-if-te-1/1/1/2/1)#show config
!
interface TenGigabitEthernet 1/1/2/1
ip vrf forwarding blue
no ip address
shutdown
Dell(conf-if-te-1/1/2/1)#
Dell(conf-if-te-1/1/2/1)#
Dell(conf-if-te-1/1/2/1)#end
Dell#

Applying Egress Layer 3 ACLs (Control-Plane)

By default, packets originated from the system are not filtered by egress ACLs.
For example, if you initiate a ping session from the system and apply an egress ACL to block this type of traffic on the interface, the ACL
does not affect that ping traffic. The Control Plane Egress Layer 3 ACL feature enhances IP reachability debugging by implementing
control-plane ACLs for CPU-generated and CPU-forwarded traffic. Using permit rules with the count option, you can track on a per-flow
basis whether CPU-generated and CPU-forwarded packets were transmitted successfully.
1
Apply Egress ACLs to IPv4 system traffic.
CONFIGURATION mode
ip control-plane [egress filter]
2
Apply Egress ACLs to IPv6 system traffic.
CONFIGURATION mode
ipv6 control-plane [egress filter]
3
Create a Layer 3 ACL using permit rules with the count option to describe the desired CPU traffic.
CONFIG-NACL mode
permit ip {source mask | any | host ip-address} {destination mask | any | host ip-address}
count
Dell Networking OS Behavior: Virtual router redundancy protocol (VRRP) hellos and internet group management protocol (IGMP) packets
are not affected when you enable egress ACL filtering for CPU traffic. Packets sent by the CPU with the source address as the VRRP
virtual IP address have the interface MAC address instead of VRRP virtual MAC address.
Access Control Lists (ACLs)
121

Advertisement

Table of Contents
loading

Table of Contents