32 configuring acl, 1 acl, 2 configuration – CANOGA PERKINS CanogaOS Configuration Guide User Manual
Page 289
CanogaOS Configuration Guide
Proprietary & Confidential Canoga Perkins Metro Ethernet Switches
Page 289 of 350
32 Configuring ACL
32.1 ACL
Access control lists (ACLs) classify traffic with the same characteristics. The ACL can have
multiple access control entries (ACEs), which are commands that match fields against the
contents of the packet. ACLs can filter packets received on interface by many fields such as ip
address, mac address and deny or permit the packets.
32.1.1 Terminology
Following is a brief description of terms and concepts used to describe the PIM-SM protocol:
Access control entry (ACE)
Each ACE includes an action element (permit or deny) and a filter element based on criteria such
as source address, destination address, protocol, and protocol-specific parameters.
MAC ACL
MAC ACL can filter packet by mac-sa and mac-da, and the mac-address can be masked, or
configured as host id, or configured as any to filter all MAC addresses. MAC ACL can also filter
other L2 fields such as COS, VLAN-ID, L2 type, L3 type.
IPv4 ACL
IPv4 ACL can filter packet by ip-sa and ip-da, and ip-address can be masked, or configured as
host id, or configured as any to filter all IPv4 address. IPv4 ACL can also filter other L3 fields
such as DSCP , L4 protocol and L4 fields such as TCP port, UDP port, and so on.
IPv6 ACL
IPv6 ACL can filter packet by ipv6-sa and ipv6-da, and ipv6 address can be masked, or
configured as host id, or configured as any to filter all IPv6 address. IPv6 ACL can also filter
other L3 fields such as DSCP , L4 protocol and L4 fields such as TCP port, UDP port, and so on.
Time Range
Time range can define a period of time only between which the ACE can be valid if the ACE is
associated to the time range.
32.2 Configuration
In this example, use MAC ACL on interface eth-0-1, to permit packets with source mac
1111.1111.1111 and deny any other packets. Use IPv4 ACL on interface eth-0-2, to permit
packets with source ip 1.1.1.1/24 and deny any other packets. Use IPv6 ACL on interface
eth-0-3, to permit UPD packets and deny any other packets.