Configure access control lists (cli example), Acl configuration examples – HP 445946-001 User Manual
Page 92

Quality of Service
92
ACL configuration examples
Configure Access Control Lists (CLI example)
The following configuration examples illustrate how to use Access Control Lists (ACLs) to block traffic.
These basic configurations illustrate common principles of ACL filtering.
NOTE:
Each ACL filters traffic that ingresses on the port to which the ACL is added. The
egrport
classifier filters traffic that ingresses the port to which the ACL is added, and then egresses the port
specified by
egrport
. In most common configurations,
egrport
is not used.
•
Example 1
Use this configuration to block traffic to a specific host.
>> Main# /cfg/acl/acl 255 (Define ACL 255)
>> ACL 255# ipv4/dip 100.10.1.116 255.255.255.255
>> Filtering IPv4# ..
>> ACL 255# action deny
>> ACL 255# /cfg/port 20/aclqos (Add ACL to port 20)
>> Port 20 ACL# add acl 255
>> Port 20 ACL# apply
>> Port 20 ACL# save
In this example, all traffic that ingresses on port 20 is denied if it is destined for the host at IP
address 100.10.1.116.
•
Example 2
Use this configuration to block traffic from a network destined for a specific host
address.
>> Main# /cfg/acl/acl 256 (Define ACL 256)
>> ACL 256# ipv4/sip 100.10.1.0 255.255.255.0
>> ACL 256# ipv4/dip 200.20.1.116 255.255.255.255
>> Filtering IPv4# ..
>> ACL 256# action deny
>> ACL 256# /cfg/port 20/aclqos (Add ACL to port 20)
>> Port 20 ACL# add acl 256
>> Port 20 ACL# apply
>> Port 20 ACL# save
In this example, all traffic that ingresses on port 20 with source IP from the class 100.10.1.0/24
and destination IP 200.20.1.116 is denied.