HP 6120G/XG HP ProCurve Series 6120 Blade Switches Access Security Guide - Page 364
Configuring and Assigning a Numbered, Standard ACL, Table 9-7., Examples of CIDR Notation for Masks
View all HP 6120G/XG manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 364 highlights
IPv4 Access Control Lists (ACLs) Configuring and Assigning an ACL Table 9-7. Examples of CIDR Notation for Masks IP Address Used In an ACL with CIDR Notation 18.38.240.125/15 18.38.240.125/20 18.38.240.125/21 18.38.240.125/24 18.38.240.125/32 Resulting ACL Mask 0.1.255.255 0.0.15.255 0.0.7.255 0.0.0.255 0.0.0.0 Meaning The leftmost 15 bits must match; the remaining bits are wildcards. The leftmost 20bits must match; the remaining bits are wildcards. The leftmost 21 bits must match; the remaining bits are wildcards. The leftmost 24 bits must match; the remaining bits are wildcards. All bits must match. Configuring and Assigning a Numbered, Standard ACL To Configure: Refer to: Configuring Named ACLs "Configuring a Named ACL" on page 9-51 Configuring Extended, "Configuring and Assigning a Numbered, Extended ACL" on page Numbered ACLs 9-45 A standard ACL uses only source IP addresses in its ACEs. This type of ACE is useful when you need to: ■ Permit or deny traffic based on source IP address only. ■ Quickly control the IP traffic from a specific address, a group of addresses, or a subnet. This allows you to isolate traffic problems generated by a specific device, group of contiguous devices, or a subnet threatening to degrade network performance. This gives you an opportunity to troubleshoot without sacrificing performance for users outside of the problem area. You can identify each standard ACL with a number in the range of 1 - 99, or an alphanumeric string of up to 64 characters. The CLI command process for using an alphanumeric string to name an ACL differs from the command process for a numeric name. For a description of how to name an ACL with an alphanumeric character string, refer to "Configuring a Named ACL" on page 9-51. To view the command differences, refer to table 9-1, "Comprehensive Command Summary" on page 9-6. 9-40