Intel BLADE SERVER IXM5414E Manuale d'uso
Pagina 272

CLI Configuration Examples
249
determines whether the packet is admitted. If the packet matches none of the criteria, it will be
dropped.
An ACL consists of up to ten rules, each applied to one or more of the following fields:
•
Source IP address
•
Destination IP address
•
Source Layer-4 port
•
Destination Layer-4 port
•
Type of Service byte
•
Internet Protocol number
The script in the following example restricts access to the network to UDP and TCP traffic from a
defined set of IP source addresses.
Create Access Control List 1.
config acl create 1
Create Rule 1 for ACL 1.
config acl rule create 1 1
Define the content of ACL 1 Rule 1. Packets will be accepted only if they are TCP packets from
the source IP address set defined by the specified IP address and mask.
config acl rule action 1 1 permit
config acl rule match protocol keyword 1 1 tcp
config acl rule match dstip 1 1 192.168.50.0 255.255.255.0
Create Rule 2 for ACL 1.
config acl rule create 1 2
Define the content of ACL 1 Rule 2. Packets will be accepted only if they are UDP packets from
the source IP address set defined by the specified IP address and mask. This is the same source
IP address set defined for TCP traffic.
config acl rule action 1 2 permit
config acl rule match protocol keyword 1 2 udp
config acl rule match dstip 1 2 192.168.50.0 255.255.255.0
Apply ACL 1 to inbound traffic received on external ports 1-4. Packets that do not match the
criteria specified in Rules 1 or 2 will be dropped.
config acl interface add ext.1 inbound 1
config acl interface add ext.2 inbound 1
config acl interface add ext.3 inbound 1
config acl interface add ext.4 inbound 1