HP GbE2c HP GbE2c Ethernet Blade Switch for c-Class BladeSystem Application Gu - Page 76

Con Access Control Lists and Groups (BBI example 1), Con Access Control Lists ACLs.

Page 76 highlights

In this example, all traffic that ingresses on port 20 with source IP from the class 100.10.1.0/24 and destination IP 200.20.1.116 is denied. Example 3: Use this configuration to block traffic from a source that is destined for a specific egress port. >> Main# /cfg/acl/acl 1 (Define ACL 1) >> ACL 1# ethernet/smac 002100000000 ffffffffffff >> Filtering Ethernet# .. >> ACL 1# action deny >> ACL 1# stats e >> ACL 1# /cfg/acl/acl 255 (Define ACL 255) >> ACL 255# egrport 24 >> ACL 255# action deny >> ACL 255# stats e >> ACL 255# /cfg/port 23/aclqos >> Port 23 ACL# add acl 1 (Add ACL 1 to port 23) >> Port 23 ACL# add acl 255 (Add ACL 255 to port 23) >> Port 23 ACL# apply >> Port 23 ACL# save In this example, all traffic (Layer 2 known unicast) that ingresses on port 23 from source MAC 00:21:00:00:00:00 and is destined for port 24 is denied. Configure Access Control Lists and Groups (BBI example 1) 1. Configure Access Control Lists (ACLs). a. Click the Configure context button on the Toolbar. b. Open the Access Control Lists folder, and select Add ACL. Quality of Service 76

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165

Quality of Service 76
In this example, all traffic that ingresses on port 20 with source IP from the class 100.10.1.0/24 and
destination IP 200.20.1.116 is denied.
Example 3
: Use this configuration to block traffic from a source that is destined for a specific egress port.
>> Main# /cfg/acl/acl 1
(Define ACL 1)
>> ACL 1# ethernet/smac 002100000000 ffffffffffff
>> Filtering Ethernet# ..
>> ACL 1# action deny
>> ACL 1# stats e
>> ACL 1# /cfg/acl/acl 255
(Define ACL 255)
>> ACL 255# egrport 24
>> ACL 255# action deny
>> ACL 255# stats e
>> ACL 255# /cfg/port 23/aclqos
>> Port 23 ACL# add acl 1
(Add ACL 1 to port 23)
>> Port 23 ACL# add acl 255
(Add ACL 255 to port 23)
>> Port 23 ACL# apply
>> Port 23 ACL# save
In this example, all traffic (Layer 2 known unicast) that ingresses on port 23 from source MAC 00:21:00:00:00:00
and
is destined for port 24 is denied.
Configure Access Control Lists and Groups (BBI example 1)
1.
Configure Access Control Lists (ACLs).
a.
Click the
Configure
context button on the Toolbar.
b.
Open the Access Control Lists folder, and select
Add ACL
.