beautypg.com

Brocade FastIron Ethernet Switch Security Configuration Guide User Manual

Page 146

background image

NOTE
Do not use an access group to apply the ACL to an interface. Instead, use a route map to apply the
ACL globally or to individual interfaces for PBR, as shown in the following sections.

Syntax: [no] access-group num { deny | permit } { source-ip | hostname wildcard }

or

Syntax: [no] access-list num { deny | permit } { source-ip/mask-bits | hostname }

Syntax: [no] access-list num { deny | permit } host { source-ip | hostname }

Syntax: [no] access-list num { deny | permit } any

The num parameter is the access list number and can be from 1 - 99.

The deny | permit parameter indicates whether packets that match a policy in the access list are
denied (dropped) or permitted (forwarded).

NOTE
If you are configuring the ACL for use in a route map, always specify permit . Otherwise, the Brocade
device will ignore deny clauses and packets that match deny clauses are routed normally.

The source-ip parameter specifies the source IP address. Alternatively, you can specify the host
name.

NOTE
To specify the host name instead of the IP address, the host name must be configured using the DNS
resolver on the Brocade device. To configure the DNS resolver name, use the ip dns server-
address
... command at the global CONFIG level of the CLI.

The wildcard parameter specifies the mask value to compare against the host address specified by the
source-ip parameter. The wildcard is in dotted-decimal notation (IP address format). It is a four-part
value, where each part is 8 bits (one byte) separated by dots, and each bit is a one or a zero. Each
part is a number ranging from 0 to 255, for example 0.0.0.255. Zeros in the mask mean the packet
source address must match the source-ip . Ones mean any value matches. For example, the source-
ip and wildcard values 10.157.22.26 0.0.0.255 mean that all hosts in the Class C subnet 10.157.22.x
match the policy.

If you prefer to specify the wildcard (mask value) in CIDR format, you can enter a forward slash after
the IP address, then enter the number of significant bits in the mask. For example, you can enter the
CIDR equivalent of "10.157.22.26 0.0.0.255" as "10.157.22.26/24". The CLI automatically converts the
CIDR number into the appropriate ACL mask (where zeros instead of ones are the significant bits) and
changes the non-significant portion of the IP address into zeros. For example, if you specify
10.157.22.26/24 or 10.157.22.26 0.0.0.255, then save the changes to the startup-config file, the value
appears as 10.157.22.0/24 (if you have enabled display of subnet lengths) or 10.157.22.0 0.0.0.255 in
the startup-config file.

If you enable the software to display IP subnet masks in CIDR format, the mask is saved in the file in "/
mask-bits " format. To enable the software to display the CIDR masks, enter the ip show-subnet-
length
command at the global CONFIG level of the CLI. You can use the CIDR format to configure the
ACL entry regardless of whether the software is configured to display the masks in CIDR format.

Rule-Based IP ACLs

146

FastIron Ethernet Switch Security Configuration Guide

53-1003088-03