Enabling acl conflict check, Enabling acl filtering of, Fragmented or non-fragmented packets – Brocade Multi-Service IronWare Security Configuration Guide (Supporting R05.6.00) User Manual
Page 146: Enabling acl filtering, Of fragmented or non-fragmented packets, Numbered acls
![background image](/manuals/361632/146/background.png)
128
Multi-Service IronWare Security Configuration Guide
53-1003035-02
Enabling ACL conflict check
3
Syntax: [no] acl-duplication-check
Enabling ACL conflict check
If desired, you can enable software checking for conflicting ACL entries. To do so, enter the
following command at the Global CONFIG level of the CLI.
Brocade(config)# acl-conflict-check
Brocade(config)# access-list 173 permit ip host 1.1.6.203 198.6.1.0 0.0.0.255
Brocade(config)# access-list 173 deny ip host 1.1.6.203 198.6.1.0 0.0.0.255
Warning: Conflicting entry in ACL 173: permit ip host 1.1.6.203 198.6.1.0
0.0.0.255
Brocade(config)# acc 174 deny ip host 1.1.6.203 198.6.1.0 0.0.0.255
Brocade(config)#
The above example generates an error message from the system as access-list 173 has a
conflicting entry. For no command, enter the following command at the Global CONFIG level of the
CLI.
Brocade(config)# no acl-conflict-check
Brocade(config)# access-list 173 permit ip host 1.1.6.201 198.6.1.0 0.0.0.255
Brocade(config)# access-list 173 deny ip host 1.1.6.201 198.6.1.0 0.0.0.255
Brocade(config)#
Syntax: [no] acl-conflict-check
NOTE
This command only checks for conflict between ACL filters that are the same except for the permit
or deny keyword.
Enabling ACL filtering of fragmented or
non-fragmented packets
To define an extended IPv4 ACL to deny or permit traffic with fragmented or unfragmented packets,
enter a command such as those shown in one of the methods below.
Numbered ACLs
Brocade(config)# access-list 111 deny ip any any fragment
Brocade(config)# int eth 1/1
Brocade(config-if-e10000-1/1)# ip access-group 111 in
Brocade(config)# write memory
The first line in the example defines ACL 111 to deny any fragmented packets. Other packets will be
denied or permitted, based on the next filter condition.
Next, after assigning the ACL to Access Group 111, the access group is bound to port 1/1. It will be
used to filter incoming traffic.
Refer to
“Extended ACL syntax”
for the complete syntax for extended ACLs.