Extended numbered ACL configuration

Extended numbered ACL syntax

Syntax: [no] access-listACL-num deny permit ip-protocol source-ip hostname wildcard [operator source-tcp/udp-port]destination-ip hostname [icmp-num icmp-type]wildcard [tcp/udp comparison operator destination-tcp/udp-port][802.1p-priority-matching<0 –7>][dscp-cos-mapping] [dscp-marking<0-63> [802.1p-priority-marking<0 –7>...dscp-cos-mapping]][dscp-matching<0-63>] [log] [precedence name <0 – 7>] [tos <0 – 63> name] [traffic policy name]

Syntax: [no] access-list ACL-numdeny permit host ip-protocolany any

Syntax: [no] ip access-group ACL-numin out

The ACL-numparameter is the extended access list number. Specify a number from 100–199.

The deny permit parameter indicates whether packets that match the policy are dropped or forwarded.

The ip-protocolparameter indicates the type of IP packet you are filtering. You can specify a well-known name for any protocol whose number is less than 255. For other protocols, you must enter the number. Enter “?” instead of a protocol to list the well-known names recognized by the CLI.

The source-ip hostname parameter specifies the source IP host for the policy. If you want the policy to match on all source addresses, enter any.

The wildcard parameter specifies the portion of the source IP host address to match against. The wildcard is in dotted-decimal notation (IP address format). It is a four-part value, where each part is 8 bits (one byte) separated by dots, and each bit is a one or a zero. Each part is a number ranging from 0 to 255, for example 0.0.0.255. Zeros in the mask mean the packet’s source address must match the source-ip . Ones mean any value matches. For example, the source-ipand wildcard values 10.157.22.26 0.0.0.255 mean that all hosts in the Class A subnet 10.157.22.x match the policy.

If you prefer to specify the wildcard (mask value) in Classless Interdomain Routing (CIDR) format, you can enter a forward slash after the IP address, then enter the number of significant bits in the mask. For example, you can enter the CIDR equivalent of “10.157.22.26 0.0.0.255” as “10.157.22.26/24”. The CLI automatically converts the CIDR number into the appropriate ACL mask (where zeros instead of ones are the significant bits) and changes the non-significant portion of the IP address into zeros. For example, if you specify 10.157.22.26/24 or 10.157.22.26 0.0.0.255, then save the changes to the startup-config file, the value appears as 10.157.22.0/24 (if you have enabled display of subnet lengths) or 10.157.22.0 0.0.0.255 in the startup-config file.

If you enable the software to display IP subnet masks in CIDR format, the mask is saved in the file in “/ mask-bits” format. To enable the software to display the CIDR masks, enter the ip show-subnet-lengthcommand at the global CONFIG level of the CLI. You can use the CIDR format to configure the ACL entry regardless of whether the software is configured to display the masks in CIDR format.

NOTE

If you use the CIDR format, the ACL entries appear in this format in the running-config and startup-config files, but are shown with subnet mask in the display produced by the show ip access-listcommand.

Brocade ICX 6650 Security Configuration Guide

91

53-1002601-01

 

Page 111
Image 111
Brocade Communications Systems 6650 manual Extended numbered ACL syntax