Applying egress acls to control (cpu) traffic, Preserving user input for acl tcp/udp port numbers – Brocade FastIron Ethernet Switch Security Configuration Guide User Manual
Page 122

NOTE
The dscp-cos-mapping option is supported on FSX devices only.
The dscp-marking option enables you to configure an ACL that marks matching packets with a
specified DSCP value. Enter a value from 0 - 63. Refer to
Using an IP ACL to mark DSCP values
The dscp-matching option matches on the packet’s DSCP value. Enter a value from 0 - 63. This
option does not change the packet’s forwarding priority through the device or mark the packet. Refer
to
on page 140.
The log parameter enables SNMP traps and Syslog messages for inbound packets denied by the
ACL:
• You can enable logging on inbound ACLs and filters that support logging even when the ACLs and
filters are already in use. To do so, re-enter the ACL or filter command and add the log parameter
to the end of the ACL or filter. The software replaces the ACL or filter command with the new one.
The new ACL or filter, with logging enabled, takes effect immediately.
The traffic-policy option enables the device to rate limit inbound traffic and to count the packets and
bytes per packet to which ACL permit or deny clauses are applied. For configuration procedures and
examples, refer to the chapter "Traffic Policies" in the FastIron Ethernet Switch Traffic Management
Guide .
Configuration example for extended named ACLs
To configure an extended named ACL, enter the ip access-list extended ACL_name command.
device(config)#ip access-list extended "block Telnet"
device(config-ext-nACL)#deny tcp host 10.157.22.26 any eq telnet log
device(config-ext-nACL)#permit ip any any
device(config-ext-nACL)#exit
device(config)#int eth 1/1
device(config-if-1/1)#ip access-group "block Telnet" in
The options at the ACL configuration level and the syntax for the ip access-group command are the
same for numbered and named ACLs and are described in
Extended numbered ACL configuration
on
page 112 and
Extended numbered ACL configuration
on page 112.
Applying egress ACLs to Control (CPU) traffic
By default, outbound ACLs are not applied to traffic generated by the CPU. This must be enabled
using the enable egress-acl-on-control-traffic command.
Syntax: enable egress-acl-on-control-traffic
Preserving user input for ACL TCP/UDP port numbers
ACL implementations automatically display the TCP/UDP port name instead of the port number,
regardless of user preference, unless the device is configured to preserve user input. When the option
to preserve user input is enabled, the system will display either the port name or the number.
Applying egress ACLs to Control (CPU) traffic
122
FastIron Ethernet Switch Security Configuration Guide
53-1003088-03