EasyManua.ls Logo

Patton electronics SmartNode Series - Adding a TCP, UDP or SCTP Filter Rule to the Current Access Control List Profile

Default Icon
655 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Access control list configuration task list 259
SmartWare Software Configuration Guide 24 • Access control list configuration
The same effect can also be obtained by using the simpler message name option. See the following example.
node(cfg)#profile acl WanRx
node(pf-acl)[WanRX]#deny icmp any any msg echo
node(pf-acl)[WanRX]#exit
node(cfg)#
Adding a TCP, UDP or SCTP filter rule to the current access control list profile
The commands permit or deny are used to define a TCP, UDP or SCTP filter rule. Each TCP, UDP or SCTP
filter rule represents a respective access of control list entry.
This procedure describes how to create a TCP, UDP or SCTP access control list entry that permits access
Mode: Profile access control list
This procedure describes how to create a TCP, UDP or SCTP access control list entry that denies access
Mode: Profile access control list
Step Command Purpose
1 node(pf-acl)[name]#permit {tcp | udp | sctp} {src src-wild-
card | any | host src} [{eq port | gt port | lt port | range
from to}] {dest dest-wildcard | any | host dest} [{eq port | gt
port | lt port | range from to}] [{cos group | cos-rtp group-
data group-ctrl}]
Creates a TCP, UDP or SCTP
access of control list entry that
permits access defined according
to the command options
Step Command Purpose
1 node(pf-acl)[name]#deny {tcp | udp | sctp} {src src-
wildcard | any | host src} [{eq port | gt port | lt port |
range from to}] {dest dest-wildcard | any | host dest} [{eq
port | gt port | lt port | range from to}] [{cos group | cos-
rtp group-data group-ctrl}]
Creates a TCP, UDP or SCTP
access of control list entry that
denies access defined according
to the command options

Table of Contents