Configuration example for standard numbered acls – Brocade TurboIron 24X Series Configuration Guide User Manual

Page 936

Advertising
background image

902

Brocade TurboIron 24X Series Configuration Guide

53-1003053-01

Configuring standard numbered ACLs

If you prefer to specify the wildcard (mask value) in CIDR format, you can enter a forward slash after
the IP address, then enter the number of significant bits in the mask. For example, you can enter
the CIDR equivalent of “10.157.22.26 0.0.0.255” as “10.157.22.26/24”. The CLI automatically
converts the CIDR number into the appropriate ACL mask (where zeros instead of ones are the
significant bits) and changes the non-significant portion of the IP address into ones. For example,
if you specify 10.157.22.26/24 or 10.157.22.26 0.0.0.255, then save the changes to the
startup-config file, the value appears as 10.157.22.0/24 (if you have enabled display of subnet
lengths) or 10.157.22.0 0.0.0.255 in the startup-config file.

If you enable the software to display IP subnet masks in CIDR format, the mask is saved in the file
in “/<mask-bits>” format. To enable the software to display the CIDR masks, enter the ip
show-subnet-length command at the global CONFIG level of the CLI. You can use the CIDR format
to configure the ACL entry regardless of whether the software is configured to display the masks in
CIDR format.

NOTE

If you use the CIDR format, the ACL entries appear in this format in the running-config and
startup-config files, but are shown with subnet mask in the display produced by the show ip
access-list command.

The host <source-ip> | <hostname> parameter lets you specify a host IP address or name. When
you use this parameter, you do not need to specify the mask. A mask of all zeros (0.0.0.0) is
implied.

The any parameter configures the policy to match on all host addresses.

The log argument configures the device to generate Syslog entries and SNMP traps for packets that
are denied by the access policy.

The in parameter applies the ACL to incoming traffic on the interface to which you apply the ACL.
You can apply the ACL to an Ethernet port or virtual interface.

NOTE

If the ACL is for a virtual routing interface, you also can specify a subset of ports within the VLAN
containing that interface when assigning an ACL to the interface.

Configuration example for standard numbered ACLs

To configure a standard ACL and apply it to incoming traffic on port 1, enter the following
commands.

TurboIron(config)#access-list 1 deny host 10.157.22.26 log

TurboIron(config)#access-list 1 deny 10.157.29.12 log

TurboIron(config)#access-list 1 deny host IPHost1 log

TurboIron(config)#access-list 1 permit any

TurboIron(config)#int eth 1

TurboIron(config-if-1)#ip access-group 1 in

TurboIron(config)#write memory

The commands in this example configure an ACL to deny packets from three source IP addresses
from being received on port 1. The last ACL entry in this ACL permits all packets that are not
explicitly denied by the first three ACL entries.

Advertising