02.10.2013 Views

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

To view <strong>the</strong> rules of a particular ACL configured on a particular interface, use <strong>the</strong> show ip accounting<br />

access-list ACL-name interface interface command (Figure 226) in EXEC privilege mode.<br />

Figure 226 Command Example: show ip accounting access-list<br />

<strong>Force10</strong>#show ip accounting access ToOspf interface gig 1/6<br />

Standard IP access list ToOspf<br />

seq 5 deny any<br />

seq 10 deny 10.2.0.0 /16<br />

seq 15 deny 10.3.0.0 /16<br />

seq 20 deny 10.4.0.0 /16<br />

seq 25 deny 10.5.0.0 /16<br />

seq 30 deny 10.6.0.0 /16<br />

seq 35 deny 10.7.0.0 /16<br />

seq 40 deny 10.8.0.0 /16<br />

seq 45 deny 10.9.0.0 /16<br />

seq 50 deny 10.10.0.0 /16<br />

<strong>Force10</strong>#<br />

Figure 227 illustrates how <strong>the</strong> seq command orders <strong>the</strong> filters according to <strong>the</strong> sequence number assigned.<br />

In <strong>the</strong> example, filter 25 was configured be<strong>for</strong>e filter 15, but <strong>the</strong> show config command displays <strong>the</strong><br />

filters in <strong>the</strong> correct order.<br />

Figure 227 Command example: seq<br />

<strong>Force10</strong>(config-std-nacl)#seq 25 deny ip host 10.5.0.0 any log<br />

<strong>Force10</strong>(config-std-nacl)#seq 15 permit tcp 10.3.0.0 /16 any<br />

<strong>Force10</strong>(config-std-nacl)#show config<br />

!<br />

ip access-list standard dilling<br />

seq 15 permit tcp 10.3.0.0/16 any<br />

seq 25 deny ip host 10.5.0.0 any log<br />

<strong>Force10</strong>(config-std-nacl)#<br />

To delete a filter, use <strong>the</strong> no seq sequence-number command in <strong>the</strong> IP ACCESS LIST mode.<br />

If you are creating a standard ACL with only one or two filters, you can let <strong>FTOS</strong> assign a sequence<br />

number based on <strong>the</strong> order in which <strong>the</strong> filters are configured. The software assigns filters in multiples of 5.<br />

To configure a filter without a specified sequence number, use <strong>the</strong>se commands in <strong>the</strong> following sequence,<br />

starting in <strong>the</strong> CONFIGURATION mode:<br />

Step Command Syntax Command Mode Purpose<br />

1 ip access-list standard<br />

access-list-name<br />

2 {deny | permit} {source [mask] |<br />

any | host ip-address} [count<br />

[byte] | log ] [order] [monitor]<br />

CONFIGURATION Create a standard IP ACL and assign it a<br />

unique name.<br />

CONFIG-STD-NACL Configure a drop or <strong>for</strong>ward IP ACL filter.<br />

• log and monitor options are<br />

supported on E-<strong>Series</strong> only.<br />

When you use <strong>the</strong> ‘log’ option, CP processor logs details about <strong>the</strong> packets that match. Depending on how<br />

many packets match <strong>the</strong> ‘log’ entry and at what rate, <strong>the</strong> CP may become busy as it has to log <strong>the</strong>se<br />

packets’ details.<br />

338 IP Access Control Lists, Prefix Lists, and Route-maps

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!