02.10.2013 Views

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

FTOS Configuration Guide for the C-Series - Force10 Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

To apply ACLs on loopback, use <strong>the</strong> ip access-group command (Figure 235) in <strong>the</strong> INTERFACE mode.<br />

This example also shows <strong>the</strong> interface configuration status, adding rules to <strong>the</strong> access group, and<br />

displaying <strong>the</strong> list of rules in <strong>the</strong> ACL:<br />

Figure 235 Applying an ACL to <strong>the</strong> Loopback Interface<br />

<strong>Force10</strong>(conf)#interface loopback 0<br />

<strong>Force10</strong>(conf-if-lo-0)#ip access-group abcd in<br />

<strong>Force10</strong>(conf-if-lo-0)#show config<br />

!<br />

interface Loopback 0<br />

no ip address<br />

ip access-group abcd in<br />

no shutdown<br />

<strong>Force10</strong>(conf-if-lo-0)#end<br />

<strong>Force10</strong>#configure terminal<br />

<strong>Force10</strong>(conf)#ip access-list extended abcd<br />

<strong>Force10</strong>(config-ext-nacl)#permit tcp any any<br />

<strong>Force10</strong>(config-ext-nacl)#deny icmp any any<br />

<strong>Force10</strong>(config-ext-nacl)#permit 1.1.1.2<br />

<strong>Force10</strong>(config-ext-nacl)#end<br />

<strong>Force10</strong>#show ip accounting access-list<br />

!<br />

Extended Ingress IP access list abcd on Loopback 0<br />

seq 5 permit tcp any any<br />

seq 10 deny icmp any any<br />

seq 10 deny icmp any any<br />

Note: See also <strong>the</strong> section VTY Line Local Au<strong>the</strong>ntication and Authorization on page 155.<br />

IP Prefix Lists<br />

IP prefix lists control routing policy. An IP prefix list is a series of sequential filters that contain a matching<br />

criterion (examine IP route prefix) and an action (permit or deny) to process routes. The filters are<br />

processed in sequence so that if a route prefix does not match <strong>the</strong> criterion in <strong>the</strong> first filter, <strong>the</strong> second<br />

filter (if configured) is applied. When <strong>the</strong> route prefix matches a filter, <strong>FTOS</strong> drops or <strong>for</strong>wards <strong>the</strong> packet<br />

based on <strong>the</strong> filter’s designated action. If <strong>the</strong> route prefix does not match any of <strong>the</strong> filters in <strong>the</strong> prefix list,<br />

<strong>the</strong> route is dropped (that is, implicit deny).<br />

A route prefix is an IP address pattern that matches on bits within <strong>the</strong> IP address. The <strong>for</strong>mat of a route<br />

prefix is A.B.C.D/X where A.B.C.D is a dotted-decimal address and /X is <strong>the</strong> number of bits that should be<br />

matched of <strong>the</strong> dotted decimal address. For example, in 112.24.0.0/16, <strong>the</strong> first 16 bits of <strong>the</strong> address<br />

112.24.0.0 match all addresses between 112.24.0.0 to 112.24.255.255.<br />

Below are some examples that permit or deny filters <strong>for</strong> specific routes using <strong>the</strong> le and ge parameters,<br />

where x.x.x.x/x represents a route prefix:<br />

• To deny only /8 prefixes, enter deny x.x.x.x/x ge 8 le 8<br />

• To permit routes with <strong>the</strong> mask greater than /8 but less than /12, enter permit x.x.x.x/x ge 8 le 12<br />

• To deny routes with a mask less than /24, enter deny x.x.x.x/x le 24<br />

Use <strong>the</strong> in keyword.<br />

Add rules to <strong>the</strong> ACL<br />

named “abcd.”<br />

Display <strong>the</strong> ACL.<br />

<strong>FTOS</strong> <strong>Configuration</strong> <strong>Guide</strong>, version 7.7.1.0 349

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!