Using Access Control Lists (ACLs)
NOTE: For convenience, the software allows you to configure numbered ACLs using the syntax for named ACLs. The software also still supports the older syntax for numbered ACLs. Although the software allows both methods for configuring numbered ACLs, numbered ACLs are always formatted in the
The options at the ACL configuration level and the syntax for the ip
Configuration Example for Extended ACL
To configure a named extended ACL entry, enter commands such as the following.
HP9300(config)# ip
HP9300(config)# int eth 1/1
The options at the ACL configuration level and the syntax for the ip
USING THE WEB MANAGEMENT INTERFACE
You cannot configure IP ACLs using the Web management interface.
Modifying ACLs
NOTE: This section applies to standard ACLs and to extended ACLs.
When you use the HP device’s CLI or Web management interface to configure an ACL, the software places the ACL entries in the ACL in the order you enter them. For example, if you enter the following entries in the order shown below, the software always applies the entries to traffic in the same order.
HP9300(config)#
HP9300(config)#
Thus, if a packet matches the first ACL entry in this ACL and is therefore denied, the software does not compare the packet to the remaining ACL entries. In this example, packets from host 209.157.22.26 will always be dropped, even though packets from this host match the second entry.
You can use the CLI to reorder entries within an ACL by individually removing the ACL entries and then
This method works well for small ACLs such as the example above, but can be impractical for ACLs containing many entries. Therefore, HP devices provide an alternative method. The alternative method lets you upload an ACL list from a TFTP server and replace the ACLs in the device’s
ACL lists contain only the ACL entries themselves, not the assignments of ACLs to interfaces. You must assign the ACLs on the device itself.
3 - 19