Configuring the layer 4 session log timer – Brocade BigIron RX Series Configuration Guide User Manual

Page 712

Advertising
background image

634

BigIron RX Series Configuration Guide

53-1002484-04

Applying ACLs to interfaces

22

NOTE

Applying an ACL to a subset of physical interfaces under a virtual routing interface multiplies the
amount of CAM used by the number of physical interfaces specified. An ACL that successfully
functions over a whole virtual routing interface may fail if you attempt to apply it to a subset of
physical interfaces.

To apply an ACL to a subset of ports within a virtual interface, enter commands such as the
following.

BigIron RX(config)# vlan 10 name IP-subnet-vlan

BigIron RX(config-vlan-10)# untag ethernet 1/1 to 2/12

BigIron RX(config-vlan-10)# router-interface ve 1

BigIron RX(config-vlan-10)# exit

BigIron RX(config)# access-list 1 deny host 209.157.22.26 log

BigIron RX(config)# access-list 1 deny 209.157.29.12 log

BigIron RX(config)# access-list 1 deny host IPHost1 log

BigIron RX(config)# access-list 1 permit any

BigIron RX(config)# interface ve 1

BigIron RX(config-vif-1)# ip access-group 1 in ethernet 1/1 ethernet 1/3 ethernet

2/1 to 2/4

The commands in this example configure port-based VLAN 10, add ports 1/1 – 2/12 to the VLAN,
and add virtual routing interface 1 to the VLAN. The commands following the VLAN configuration
commands configure ACL 1. Finally, the last two commands apply ACL 1 to a subset of the ports
associated with virtual interface 1.

Syntax: [no] ip access-group <num> in ethernet <slot>/<portnum> [<slot>/<portnum>...] to

<slot>/<portnum>

NOTE

The timer for logging packets denied by Layer 2 filters is separate.

Configuring the Layer 4 session log timer

You can configure the Layer 4 session log timer, which tracks packets explicitly denied by an ACL.

The first time an ACL entry denies a packet, the software immediately generates a Syslog entry and
SNMP trap. The software also starts the Layer 4 session log timer. When the timer expires, the
software generates a single Syslog entry for each ACL entry that has denied a packet. The message
indicates the number of packets denied by the ACL entry from the time that the timer was started.
If no ACL entries explicitly deny packets during an entire timer interval, the timer stops. The timer
restarts when an ACL entry explicitly denies a packet.

For example, to set the timer interval to 2 minutes, enter the following command.

BigIron RX(config)# ip access-list logging-age 2

Syntax: ip access-list logging-age <minutes>

You can set the timer to between 1 and 10 minutes. The default is 5 minutes.

Advertising