Dell Force10 S2410-01-10GE-24P SFTOS Configuration Guide - Page 200

IP ACL Commands, Standard IP ACLs, Extended IP ACLs

Page 200 highlights

www.dell.com | support.dell.com IP ACL Commands IP ACLs ensure that only authorized users have access to specific resources and block any unwarranted attempts to reach network resources. The following rules apply to IP ACLs: • SFTOS does not support IP ACL configuration for IP packet fragments. • The maximum number of ACLs you can create is 100, regardless of type. • The maximum number of rules per IP ACL is hardware dependent. • On S-Series systems, if you configure a MAC ACL (see MAC ACL Commands on page 198) on an interface, you cannot configure an IP ACL on the same interface. • Wildcard masking for ACLs operates differently from a subnet mask. A wildcard mask is in essence the inverse of a subnet mask. With a subnet mask, the mask has ones (1's) in the bit positions that are used for the network address, and has zeros (0's) for the bit positions that are not used. In contrast, a wildcard mask has (0's) in a bit position that must be checked. A '1' in a bit position of the ACL mask indicates the corresponding bit can be ignored. The access-list command creates an IP ACL that is identified by the parameter ACLnumber, rendered as 1-99 for a Standard IP ACL or 100-199 for an Extended IP ACL, as discussed next. Standard IP ACLs A Standard IP ACL uses a list number in the range of 1-99, matches source IP address, then takes the action of assigning the packet to a queue and/or redirecting the packet to a destination port. access-list 1-99 {deny | permit} {every | srcip srcmask} [log] [assign-queue queue-id] [{mirror | redirect} unit/slot/port] Extended IP ACLs An extended IP ACL uses a list number in the range of 100-199, matches protocol type, then matches source and/or destination ip address/port, additionally matches ip-precedence, tos, dscp, then takes the action of assigning the packet to a queue and/or redirecting the packet to a destination port. The command has the general form: access-list 100-199 {deny | permit} {every | icmp | igmp | ip | tcp | udp | protocol_number} {any | srcip srcmask} {any | eq {portkey | 0-65535}{any | dstip dstmask} [eq {portkey | 0-65535}] [precedence precedence | tos tos tosmask | dscp dscp] [log] [assign-queue queue-id] [{mirror | redirect} unit/slot/port] Figure 13-159. Using the access-list Command for an Extended IP ACL Rule Force10 (Config)#access-list 100 permit ip any eq 80 any assign-queue 2 redirect 1/0/40 Force10 (Config)# Note: In both versions of the access-list command, above, srcmask is an inverse mask. Note: You cannot edit a rule once it is created, you must delete the list and create one as desired. 200 | Access Control

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306

200
|
Access Control
www.dell.com | support.dell.com
IP ACL Commands
IP ACLs ensure that only authorized users have access to specific resources and block any unwarranted
attempts to reach network resources.
The following rules apply to IP ACLs:
SFTOS does not support IP ACL configuration for IP packet fragments.
The maximum number of ACLs you can create is 100, regardless of type.
The maximum number of rules per IP ACL is hardware dependent.
On S-Series systems, if you configure a MAC ACL (see
MAC ACL Commands on page 198
) on an
interface, you cannot configure an IP ACL on the same interface.
Wildcard masking for ACLs operates differently from a subnet mask. A wildcard mask is in essence
the inverse of a subnet mask. With a subnet mask, the mask has ones (1's) in the bit positions that are
used for the network address, and has zeros (0's) for the bit positions that are not used. In contrast, a
wildcard mask has (0’s) in a bit position that must be checked. A ‘1’ in a bit position of the ACL mask
indicates the corresponding bit can be ignored.
The
access-list
command creates an IP ACL that is identified by the parameter ACL
number
, rendered as
1-99
for a Standard IP ACL or
100-199
for an Extended IP ACL, as discussed next.
Standard IP ACLs
A Standard IP ACL uses a list number in the range of 1-99, matches source IP address, then takes the
action of assigning the packet to a queue and/or redirecting the packet to a destination port.
access-list
1-99
{
deny
|
permit
} {
every
|
srcip
srcmask
} [
log
] [
assign-queue
queue-id
] [{
mirror
|
redirect
}
unit/slot/port
]
Extended IP ACLs
An extended IP ACL uses a list number in the range of 100-199, matches protocol type, then matches
source and/or destination ip address/port, additionally matches ip-precedence, tos, dscp, then takes the
action of assigning the packet to a queue and/or redirecting the packet to a destination port. The command
has the general form:
access-list
100-199
{
deny
|
permit
} {
every
|
icmp
|
igmp
|
ip
|
tcp
|
udp
|
protocol_number
} {
any
|
srcip
srcmask
} {
any
|
eq
{
portkey
|
0-65535
}{
any
|
dstip
dstmask
} [
eq
{
portkey
|
0-65535
}] [
precedence
precedence
|
tos
tos
tosmask
|
dscp
dscp
] [
log
] [
assign-queue
queue-id
] [{
mirror
|
redirect
}
unit/slot/port
]
Figure 13-159.
Using the access-list Command for an Extended IP ACL Rule
Note:
In both versions of the access-list command, above,
srcmask
is an inverse mask.
Note:
You cannot edit a rule once it is created, you must delete the list and create one as desired.
Force10 (Config)#access-list 100 permit ip any eq 80 any assign-queue 2 redirect 1/0/40
Force10 (Config)#