Configuration example for standard numbered acls – Brocade TurboIron 24X Series Configuration Guide User Manual
Page 936

902
Brocade TurboIron 24X Series Configuration Guide
53-1003053-01
Configuring standard numbered ACLs
If you prefer to specify the wildcard (mask value) in CIDR format, you can enter a forward slash after
the IP address, then enter the number of significant bits in the mask. For example, you can enter
the CIDR equivalent of “10.157.22.26 0.0.0.255” as “10.157.22.26/24”. The CLI automatically
converts the CIDR number into the appropriate ACL mask (where zeros instead of ones are the
significant bits) and changes the non-significant portion of the IP address into ones. For example,
if you specify 10.157.22.26/24 or 10.157.22.26 0.0.0.255, then save the changes to the
startup-config file, the value appears as 10.157.22.0/24 (if you have enabled display of subnet
lengths) or 10.157.22.0 0.0.0.255 in the startup-config file.
If you enable the software to display IP subnet masks in CIDR format, the mask is saved in the file
in “/
show-subnet-length command at the global CONFIG level of the CLI. You can use the CIDR format
to configure the ACL entry regardless of whether the software is configured to display the masks in
CIDR format.
NOTE
If you use the CIDR format, the ACL entries appear in this format in the running-config and
startup-config files, but are shown with subnet mask in the display produced by the show ip
access-list command.
The host
you use this parameter, you do not need to specify the mask. A mask of all zeros (0.0.0.0) is
implied.
The any parameter configures the policy to match on all host addresses.
The log argument configures the device to generate Syslog entries and SNMP traps for packets that
are denied by the access policy.
The in parameter applies the ACL to incoming traffic on the interface to which you apply the ACL.
You can apply the ACL to an Ethernet port or virtual interface.
NOTE
If the ACL is for a virtual routing interface, you also can specify a subset of ports within the VLAN
containing that interface when assigning an ACL to the interface.
Configuration example for standard numbered ACLs
To configure a standard ACL and apply it to incoming traffic on port 1, enter the following
commands.
TurboIron(config)#access-list 1 deny host 10.157.22.26 log
TurboIron(config)#access-list 1 deny 10.157.29.12 log
TurboIron(config)#access-list 1 deny host IPHost1 log
TurboIron(config)#access-list 1 permit any
TurboIron(config)#int eth 1
TurboIron(config-if-1)#ip access-group 1 in
TurboIron(config)#write memory
The commands in this example configure an ACL to deny packets from three source IP addresses
from being received on port 1. The last ACL entry in this ACL permits all packets that are not
explicitly denied by the first three ACL entries.