Established Flag; Configuring Layer 2 And Layer 3 Acls On An Interface - Dell Force10 C150 Configuration Manual

Ftos configuration guide ftos 8.4.2.7 e-series terascale, c-series, s-series (s50/s25)
Hide thumbs Also See for Force10 C150:
Table of Contents

Advertisement

Figure 8-8
The filters were assigned sequence numbers based on the order in which they were configured (for
example, the first filter was given the lowest sequence number). The
ACCESS LIST mode displays the two filters with the sequence numbers 5 and 10.
Figure 8-8. Extended IP ACL
FTOS(config-ext-nacl)#deny tcp host 123.55.34.0 any
FTOS(config-ext-nacl)#permit udp 154.44.123.34 0.0.255.255 host 34.6.0.0
FTOS(config-ext-nacl)#show config
!
ip access-list extended nimule
seq 5 deny tcp host 123.55.34.0 any
seq 10 permit udp 154.44.0.0 0.0.255.255 host 34.6.0.0
FTOS(config-ext-nacl)#
To view all configured IP ACLs and the number of packets processed through the ACL, use the
accounting access-list

Established Flag

est
The
(established) flag is deprecated for Terascale series line cards.The flag is only available on legacy
Etherscale linecards. Employ the
To obtain the functionality of
permit tcp any any rst
permit tcp any any ack

Configuring Layer 2 and Layer 3 ACLs on an Interface

Both Layer 2 and Layer 3 ACLs may be configured on an interface in Layer 2 mode. If both L2 and L3
ACLs are applied to an interface, the following rules apply:
The packets routed by FTOS are governed by the L3 ACL only, since they are not filtered against an
L2 ACL.
The packets switched by FTOS are first filtered by the L3 ACL, then by the L2 ACL.
When packets are switched by FTOS, the egress L3 ACL does not filter the packet.
For the following features, if counters are enabled on rules that have already been configured and a new
rule is either inserted or prepended, all the existing counters will be reset:
L2 Ingress Access list
L3 Egress Access list
L2 Egress Access list
146
|
IP Access Control Lists (ACL), Prefix Lists, and Route-maps
illustrates an extended IP ACL in which the sequence numbers were assigned by the software.
command
(Figure 232)
ack
est,
use the following ACLs:
in the EXEC Privilege mode.
rst
and
flags in their stead to achieve the same functionality.
show config
command in the IP
show ip

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents