EasyManuals Logo

Cisco Catalyst 4500 Series Software Configuration Guide

Cisco Catalyst 4500 Series
2086 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1663 background imageLoading...
Page #1663 background image
62-39
Catalyst 4500 Series Switch, Cisco IOS Software Configuration Guide - Cisco IOS XE 3.9.xE and IOS 15.2(5)Ex
Chapter 62 Configuring Network Security with ACLs
Configuring Object Group ACLs
applied to the ingress traffic from Host A, the VACL is applied on the traffic and finally, and the input
Router ACL is applied to the traffic that needs routing. (that is, the merged results of the input PACL,
VACL, and input Router ACL are applied to the traffic).
Configuring Object Group ACLs
Object groups provide an alternative way of dealing with ACLs.
Instead of allowing or disallowing individual IP addresses, protocols, and ports (which are used in
conventional ACLs), you can use each ACE to allow or disallow an entire group of users to access a
group of servers or services.
Object groups enable you to group ACE entries and add or remove entries while keeping your ACL
structure more readable. Object group ACLs (OG ACLs) are especially suited to help you manage large
ACLs that require frequent changing. Cisco IOS Firewall benefits from object groups, because they
simplify policy creation (for example, group A has access to group A services).
Beginning with Cisco IOS XE Release 3.7.1E, object groups are supported for IPv4 ACLs (IPv4 OG
ACLs), and with Cisco IOS XE Release 3.9.2E, for IPv6 ACLs (IPv6 OG ACLs). The feature is
supported only on Cisco Catalyst 4500E Series Switches with Supervisor Engines 7-E, 7L-E, and 8-E,
and Cisco Catalyst 4500-X Series Switches.
See the following sections for more information:
• Overview, page 62-39
• Configuring IPv4 OG ACLs, page 62-40
• Configuring IPv6 OG ACLs, page 62-46
Overview
All features that use or reference conventional ACLs are compatible with OG ACLs. This feature extends
the conventional ACLs to support OG ACLs and also adds new keywords and the source and destination
addresses and ports.
To configure OG ACLs, you first create one or more object groups. These can be any combination of
network object groups or service object groups. You then create ACEs that apply a policy (such as permit
or deny) to those object groups.
A network object group includes the following objects:
• Host IP addresses
• Network address of group members
• Nested object groups
A service object group includes the following objects:
• Source and destination protocol ports (such as Telnet or Simple Network Management Protocol
[SNMP])
• Internet Control Message Protocol (ICMP) types (such as echo, echo-reply, or host-unreachable)
• Top-level protocols (such as Encapsulating Security Payload [ESP], TCP, or UDP)
• Other service object groups
You can configure an OG ACL multiple times with a source group only, a destination group only, or both
source and destination groups.

Table of Contents

Other manuals for Cisco Catalyst 4500 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 4500 Series and is the answer not in the manual?

Cisco Catalyst 4500 Series Specifications

General IconGeneral
SeriesCatalyst 4500 Series
CategorySwitch
Layer SupportLayer 2, Layer 3
Form FactorModular chassis
StackableNo
Chassis Slots3, 6, 7, 10
Power Supply OptionsAC, DC
RedundancyPower supply, Supervisor engine
Network ManagementCisco IOS Software CLI, SNMP, Cisco Prime Infrastructure
FeaturesSecurity, QoS
Port DensityUp to 384 ports per chassis
Security Features802.1X, ACLs, DHCP Snooping, Dynamic ARP Inspection, IP Source Guard
Supervisor Engine8-E

Related product manuals