Intel BLADE SERVER IXM5414E Manuale d'uso

Pagina 272

Advertising
background image

CLI Configuration Examples

249

determines whether the packet is admitted. If the packet matches none of the criteria, it will be
dropped.

An ACL consists of up to ten rules, each applied to one or more of the following fields:

Source IP address

Destination IP address

Source Layer-4 port

Destination Layer-4 port

Type of Service byte

Internet Protocol number

The script in the following example restricts access to the network to UDP and TCP traffic from a
defined set of IP source addresses.

Create Access Control List 1.

config acl create 1

Create Rule 1 for ACL 1.

config acl rule create 1 1

Define the content of ACL 1 Rule 1. Packets will be accepted only if they are TCP packets from
the source IP address set defined by the specified IP address and mask.

config acl rule action 1 1 permit

config acl rule match protocol keyword 1 1 tcp

config acl rule match dstip 1 1 192.168.50.0 255.255.255.0

Create Rule 2 for ACL 1.

config acl rule create 1 2

Define the content of ACL 1 Rule 2. Packets will be accepted only if they are UDP packets from
the source IP address set defined by the specified IP address and mask. This is the same source
IP address set defined for TCP traffic.

config acl rule action 1 2 permit

config acl rule match protocol keyword 1 2 udp

config acl rule match dstip 1 2 192.168.50.0 255.255.255.0

Apply ACL 1 to inbound traffic received on external ports 1-4. Packets that do not match the
criteria specified in Rules 1 or 2 will be dropped.

config acl interface add ext.1 inbound 1

config acl interface add ext.2 inbound 1

config acl interface add ext.3 inbound 1

config acl interface add ext.4 inbound 1

Advertising