Installation and Getting Started Guide
If you prefer to specify the wildcard (mask value) in CIDR format, you can enter a forward slash after the IP address, then enter the number of significant bits in the mask. For example, you can enter the CIDR equivalent of “209.157.22.26 0.0.0.255” as “209.157.22.26/24”. The CLI automatically converts the CIDR number into the appropriate ACL mask (where zeros instead of ones are the significant bits) and changes the
If you enable the software to display IP
NOTE: If you use the CIDR format, the ACL entries appear in this format in the
The host
The any parameter configures the policy to match on all host addresses.
The log argument configures the device to generate Syslog entries and SNMP traps for packets that are permitted or denied by the access policy.
NOTE: You can enable logging on ACLs and filters that support logging even when the ACLs and filters are already in use. To do so,
Configure the Route Map
After you configure the ACLs, you can configure a PBR route map that matches based on the ACLs and sets routing information in the IP traffic.
For example, to configure a PBR route map named
HP9300(config)#
The commands in this example configure an entry in a route map named
Syntax:
The
The permit deny parameter specifies the action the routing switch will take if a route matches a match statement.
•If you specify deny, the routing switch does not advertise or learn the route.
•If you specify permit, the routing switch applies the match and set statements associated with this route map instance.
The <num> parameter specifies the instance of the route map you are defining. Each route map can have up to 50 instances. Routes are compared to the instances in ascending numerical order. For example, a route is compared to instance 1, then instance 2, and so on.
Syntax: match ip address
3 - 26