Using Access Control Lists (ACLs)
The second entry denies all FTP traffic from the 209.157.21.x network to the 209.157.22.x network, if the traffic has the IP precedence value “6” (equivalent to “internet”).
The third entry permits all packets that are not explicitly denied by the other entries. Without this entry, the ACL would deny all incoming or outgoing IP traffic on the ports to which you assign the ACL.
To configure an IP ACL that matches based on TOS, enter commands such as the following:
HP9300(config)#
HP9300(config)#
The first entry in this IP ACL denies TCP traffic from the 209.157.21.x network to the 209.157.22.x network, if the traffic has the IP TOS option “normal” (equivalent to “0”).
The second entry denies all FTP traffic from the 209.157.21.x network to the 209.157.22.x network, if the traffic has the IP precedence value “13” (equivalent to
The third entry permits all packets that are not explicitly denied by the other entries. Without this entry, the ACL would deny all incoming or outgoing IP traffic on the ports to which you assign the ACL.
Extended ACL Syntax
Syntax:
Syntax: [no]
Syntax: [no] ip
The <num> parameter indicates the ACL number and be from 100 – 199 for an extended ACL.
The deny permit parameter indicates whether packets that match the policy are dropped or forwarded.
The
•icmp
•igmp
•igrp
•ip
•ospf
•tcp
•udp
•
The
The <wildcard> parameter specifies the portion of the source IP host address to match against. The <wildcard> is a
If you prefer to specify the wildcard (mask value) in Classless Interdomain Routing (CIDR) format, you can enter a forward slash after the IP address, then enter the number of significant bits in the mask. For example, you can enter the CIDR equivalent of “209.157.22.26 0.0.0.255” as “209.157.22.26/24”. The CLI automatically converts the CIDR number into the appropriate ACL mask (where zeros instead of ones are the significant bits) and changes the
3 - 11