HP ProCurve 2910al Access Security Manual page 335

Hide thumbs Also See for ProCurve 2910al:
Table of Contents

Advertisement

Configuring ACEs in an Named, Standard ACL. Configuring ACEs is
done after using the ip access-list standard < name-str > command described
above to enter the "Named ACL" (nacl) context of an access list. For a
standard ACL syntax summary, refer to table 9-6 on page 9-44.
Syntax: < deny | permit >
< any | host < SA > | SA <mask | SA/ mask-length >> [log]
Executing this command appends the ACE to the end of the list
of ACEs in the current ACL. In the default ACL configuration,
ACEs are automatically assigned consecutive sequence num­
bers in increments of 10 and can be renumbered using
resequence (page 9-80).
Note: To insert a new ACE between two existing ACEs, precede
deny or permit with an appropriate sequence number. (Refer to
"Inserting an ACE in an Existing ACL" on page 9-77.)
< deny | permit >
For named ACLs, used in the "Named ACL" (nacl) context to
configure an ACE. Specifies whether the ACE denies or permits
a packet matching the criteria in the ACE, as described below.
< any | host < SA > | SA < mask > | SA/mask-length >
Defines the source IPv4 address (SA) a packet must carry for
a match with the ACE.
• any — Allows IPv4 packets from any SA.
• host < SA > — Specifies only packets having < SA > as the
source. Use this criterion when you want to match the IPv4
packets from a single source address.
• SA < mask > or SA /mask-length — Specifies packets received
from either a subnet or a group of IPv4 addresses. The mask
format can be in either dotted-decimal format or CIDR
format (number of significant bits). (Refer to "Using CIDR
Notation To Enter the IPv4 ACL Mask" on page 9-43).
Mask Application: The mask is applied to the IPv4 address
in the ACE to define which bits in a packet's SA must exactly
match the SA configured in the ACE and which bits need not
match. For example: 10.10.10.1/24 and 10.10.10.1 0.0.0.255 both
define any address in the range of 10.10.10.(1 - 255).
Note: Specifying a group of contiguous addresses may
require more than one ACE. For more on how masks operate,
refer to "How an ACE Uses a Mask To Screen Packets for
Matches" on page 9-28.
IPv4 Access Control Lists (ACLs)
Configuring Standard ACLs
9-47

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents