1. Manuals
  2. Brands
  3. Computer Equipment
  4. Switch
  5. IBM
  6. Computer Equipment
  7. Switch

IBM 12.1(22)EA6 Configuring Network Security with ACLs

1 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 550
Download on canonical page 550 pages, 5.74 Mb
CHAPTER
22-1
Cisco Systems IntelligentGigabit Ethernet Switch Modules for the IBM BladeCenter, Software Configuration Guide
24R9746
22
Configuring Network Security with ACLs
This chapter describes how to configure network security on a Cisco Systems Intelligent Gigabit
Ethernet Switch Module by using access control lists (ACLs), which are also referred to in commands
and tables as access lists.
You can create ACLs for physical interfaces or management interfaces. A management interface is
defined as a management VLAN or any traffic that is going di rectly to the CPU, such as SNMP, Telnet,
or web traffic.
Note An ACLs that applied is to a physical interface has a limitation of one mask, and certain keywords are
not supported. For more information, see the “Guidelines for Applying ACLs to Physical Inter faces”
section on page 22-5.
Note For complete syntax and usage information for the commands used in this chapter, see the command
reference for this release and the “Configuring IP Serv ices” section of the Cisco IOS IP and IP Routing
Configuration Guide, Cisco IOS Release 12.1 and the Cisco IOS IP and IP Routing Command Reference,
Cisco IOS Release 12.1.
This chapter consists of these sections:
Understanding ACLs, page 22-2
Configuring ACLs, page 22-6
Displaying ACL Information, page 22-20
Examples for Compiling ACLs, page 22-22
You can configure ACLs by using the command-line interface (CLI).
You can also use the security wizard to filter inbound traffic on the switches. Filtering can be based on
network addresses, TCP applications, or User Datagram Protocol (UDP ) applications. You can choose
whether to drop or to forward packets that meet the filtering criteria. To use this wizard, you must know
how the network is designed and how interfaces are used on the filtering device. See the security wizard
online help for step-by-step configuration procedures about using this wizard.
MENU

Models

Contents