Intel BLADE SERVER IXM5414E User Manual Page 272

  • Download
  • Add to my manuals
  • Print
  • Page
    / 303
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 271
CLI Configuration Examples 249
determines whether the packet is admitted. If the packet matches none of the criteria, it will be
dropped.
An ACL consists of up to ten rules, each applied to one or more of the following fields:
Source IP address
Destination IP address
Source Layer-4 port
Destination Layer-4 port
Type of Service byte
Internet Protocol number
The script in the following example restricts access to the network to UDP and TCP traffic from a
defined set of IP source addresses.
Create Access Control List 1.
config acl create 1
Create Rule 1 for ACL 1.
config acl rule create 1 1
Define the content of ACL 1 Rule 1. Packets will be accepted only if they are TCP packets from
the source IP address set defined by the specified IP address and mask.
config acl rule action 1 1 permit
config acl rule match protocol keyword 1 1 tcp
config acl rule match dstip 1 1 192.168.50.0 255.255.255.0
Create Rule 2 for ACL 1.
config acl rule create 1 2
Define the content of ACL 1 Rule 2. Packets will be accepted only if they are UDP packets from
the source IP address set defined by the specified IP address and mask. This is the same source
IP address set defined for TCP traffic.
config acl rule action 1 2 permit
config acl rule match protocol keyword 1 2 udp
config acl rule match dstip 1 2 192.168.50.0 255.255.255.0
Apply ACL 1 to inbound traffic received on external ports 1-4. Packets that do not match the
criteria specified in Rules 1 or 2 will be dropped.
config acl interface add ext.1 inbound 1
config acl interface add ext.2 inbound 1
config acl interface add ext.3 inbound 1
config acl interface add ext.4 inbound 1
Page view 271
1 2 ... 267 268 269 270 271 272 273 274 275 276 277 ... 302 303

Comments to this Manuals

No comments