Дерево страниц
Перейти к концу метаданных
Переход к началу метаданных

action

The command specifies the action that should be applied for the traffic meeting this requirements.

The use of a negative form (no) of the command removes an assigned action.

Syntax

action <ACT>

no action

Parameters

<ACT> – allocated action:

  • permit – traffic transfer is permitted;
  • deny – traffic transfer is denied.
Required privilege level

10

Command mode

CONFIG-ACL-RULE

Example
esr(config-acl-rule)# action permit

description

The command is used to change a description of configured access control list.

The use of a negative form (no) of the command removes a specified description.

Syntax

description <DESCRIPTION>

no description

Parameters

<DESCRIPTION> – access control list description, set by the string of up to 255 characters.

Required privilege level

10

Command mode

CONFIG-ACL

Example
esr(config-acl)# description "Drop SSH traffic"

enable

The command enables a rule.

The use of a negative form (no) of the command enables a rule.

Syntax

[no] enable

Parameters

The command does not contain parameters.

Default value

Rule is disabled

Required privilege level

10

Command mode

CONFIG-ACL-RULE

Example
esr(config-acl-rule)# enable

ip access-list extended

The command is used to create an access control list and to switch to the list configuration mode.

The use of a negative form (no) of the command removes a specified access control list.

Syntax

[no] ip access-list extended <NAME>

Parameters

<NAME> – access control list name, set by the string of up to 31 characters.

Required privilege level

10

Command mode

CONFIG

Example
esr(config)# ip access-list extended acl-ssh-drop
esr(config-acl)#

match cos

The command sets 802.1p priority value for which the rule should work.

The use of a negative form (no) of the command cancels the assignment.

Syntax

match cos <COS>

no match cos

Parameters

<COS>  – priority 802.1p value, takes values of [0..7].

Required privilege level

10

Command mode

CONFIG-ACL-RULE

Example
esr(config-acl-rule)# match cos 2

match destination-address

The command sets destination IP addresses for which the rule should work.

The use of a negative form (no) of the command cancels the assignment.

Syntax

match destination-address { <ADDR> <MASK> | any }

no match destination-address

Parameters

<ADDR> – receiver IP address, defined as AAA.BBB.CCC.DDD where each part takes values of [0..255];

<MASK> – IP address mask, defined as AAA.BBB.CCC.DDD where each part takes values of [0..255]. Mask bits, set to zero, specify IP address bits excluded from the comparison when searching.

When specifying the 'any' value, the rule will be triggered for any source IP address.

Default value

any

Required privilege level

10

Command mode

CONFIG-ACL-RULE

Example
esr(config-acl-rule)# match destination-address 10.10.10.0 255.255.255.0

match destination-mac

The command sets destination MAC addresses for which the rule should work.

The use of a negative form (no) of the command cancels the assignment.

Syntax

match destination-mac <ADDR> <WILDCARD>

no match destination-mac

Parameters

<ADDR> – receiver MAC address, defined as XX:XX:XX:XX:XX:XX where each part takes the values of [00..FF];

<WILDCARD> – MAC address mask, defined as XX:XX:XX:XX:XX:XX where each part takes the values of [00..FF]. Mask bits, set to zero, specify MAC address bits excluded from the comparison when searching.

Required privilege level

10

Command mode

CONFIG-ACL-RULE

Example
esr(config-acl-rule)# match destination-mac A8:F9:4B:AA:00:41 00:00:00:00:00:FF

match destination-port

The command sets the number of source TCP/UDP port for which the rule should work.

The use of a negative form (no) of the command removes the assignment.

Syntax

match destination-port {<PORT> | any}

no match destination-port

Parameters

<PORT> – number of destination TCP/UDP port, takes values of [1..65535]. When specifying the 'any' value, the rule will be triggered for any source TCP/UDP port.

Default value

any

Required privilege level

10

Command mode

CONFIG-ACL-RULE

Example
esr(config-acl-rule)# match destination-port 22

match dscp

The command sets DSCP code value for which the rule should work.

The use of a negative form (no) of the command cancels the assignment.

Syntax

match dscp <DSCP>

no match dscp

Parameters

<DSCP> – DSCP code value, takes values in the range of [0..63].

Required privilege level

10

Command mode

CONFIG-ACL-RULE

Example
esr(config-acl-rule)# match dscp 55

match ip-precedence

The command sets IP Precedence code value for which the rule should work.

The use of a negative form (no) of the command cancels the assignment.

Syntax

match ip-precedence <IPP>

no match ip-precedence

Parameters

<IPP> – IP Precedence code value, takes values in the range of [0..7].

Required privilege level

10

Command mode

CONFIG-ACL-RULE

Example
esr(config-acl-rule)# match ip-precedence 5

match protocol

match protocol

The command sets name of IP for which the rule should work.

The use of a negative form (no) of the command cancels the assignment.

Syntax

match protocol <TYPE>

no match protocol

match protocol-id <ID>

no match protocol-id

Parameters

<TYPE> – protocol type, takes the following values: esp, icmp, ah, eigrp, ospf, igmp, ipip, tcp, pim, udp, vrrp, rdp, l2tp, gre. When specifying the 'any' value, the rule will work for any protocols.

<ID> – IP identification number, takes values of [0x00-0xFF].

When specifying the 'any' value, the rule will work for any protocols.

Default value

any

Required privilege level

10

Command mode

CONFIG-ACL-RULE

Example
esr(config-acl-rule)# match protocol tcp

match source-address

The command sets source IP addresses for which the rule should work.

The use of a negative form (no) of the command cancels the assignment.

Syntax

match source-address { <ADDR> <MASK> | any }

no match source-address

Parameters

<ADDR> – source IP address, defined as AAA.BBB.CCC.DDD where each part takes values of [0..255];

<MASK> – IP address mask, defined as AAA.BBB.CCC.DDD where each part takes values of [0..255]. Mask bits, set to zero, specify IP address bits excluded from the comparison when searching.

When specifying the 'any' value, the rule will be triggered for any source IP address.

Default value

any

Required privilege level

10

Command mode

CONFIG-ACL-RULE

Example
esr(config-acl-rule)# match source-address 10.100.100.0 255.255.255.0

match source-mac

The command sets source MAC addresses for which the rule should work.

The use of a negative form (no) of the command cancels the assignment.

Syntax

match source-mac <ADDR> <WILDCARD>

no match source-mac

Parameters

<ADDR> – source MAC address, defined as XX:XX:XX:XX:XX:XX where each part takes the values of [00..FF].

<WILDCARD> – MAC address mask, defined as XX:XX:XX:XX:XX:XX where each part takes the values of [00..FF]. Mask bits, set to zero, specify MAC address bits excluded from the comparison when searching.

Required privilege level

10

Command mode

CONFIG-ACL-RULE

Example
esr(config-acl-rule)# match source-mac A8:F9:4B:AA:00:40 00:00:00:FF:FF:FF

match source-port

The command sets the number of source TCP/UDP port for which the rule should work.

The use of a negative form (no) of the command cancels the assignment.

Syntax

match source-port { <PORT> | any }

no match source-port

Parameters

<PORT> – number of source TCP/UDP port, takes values of [1..65535]. When specifying the 'any' value, the rule will be triggered for any source TCP/UDP port.

Default value

any

Required privilege level

10

Command mode

CONFIG-ACL-RULE

Example
esr(config-acl-rule)# match source-port any

match vlan

The command sets VLAN ID value for which the rule should work.

The use of a negative form (no) of the command cancels the assignment.

Syntax

match vlan <VID>

no match vlan

Parameters

<VID>  – VLAN ID, takes values of [1..4094].

Required privilege level

10

Command mode

CONFIG-ACL-RULE

Example
esr(config-acl-rule)# match vlan 100

rule

The command creates a rule and switches to CONFIG-ACL-RULE configuration mode. The rules are proceeded by the device in number ascending order.

The use of a negative form (no) of the command removes a specified rule.

Syntax

[no] rule <ORDER>

Parameters

<ORDER>  – rule number, takes values of [1..4094].

Required privilege level

10

Command mode

CONFIG-ACL

Example
esr(config-acl)# rule 10
esr(config-acl-rule)#

service-acl input

The command binds a specified access control list to a configured interface to filtrate incoming traffic.

The use of a negative form (no) of the command removes the binding of access control list to this interface.

Syntax

service-acl input <NAME>

no service-acl input

Parameters

<NAME> – access control list name, set by the string of up to 31 characters.

Required privilege level

15

Command mode

CONFIG-GI

CONFIG-TE

CONFIG-PORT-CHANNEL

Example
esr(config-if-gi)# service-acl input acl-ssh-drop

show ip access-list

The command displays access control lists.

Syntax

show ip access-list [ <NAME> [ <ORDER> ] ]

Parameters

<NAME> – access control list name, set by the string of up to 31 characters;

<ORDER> – rule number, takes values of [1..4096]. When specifying a rule number, only the given rules information will be displayed.

Required privilege level

1

Command mode

ROOT

Example
esr# show ip access-list
Name                               Description
--------------------------------   -----------------------------------------------
acl-telnet-drop                    --
acl-ssh-drop                       Drop SSH traffic
esr# show ip access-list acl-ssh-drop
Index:                        1
Matching pattern:
    Protocol:                 TCP(6)
    Source MAC address:       any
    Source IP address:        any
    Source port:              any
    Destination MAC address:  any
    Destination IP address:   any
    Destination port:         22
Action:                       Deny
Status:                       Enabled
--------------------------------------------------------------------------------
Index:                        2
Matching pattern:
    Protocol:                 any
    Source MAC address:       any
    Source IP address:        any
    Destination MAC address:  any
    Destination IP address:   any
Action:                       Permit
Status:                       Enabled
--------------------------------------------------------------------------------
  • Нет меток