Configuration Guide Manual
Brocade TurboIron 24X Series Configuration Guide 897
53-1003053-01
Chapter
28
Configuring Rule-Based IP Access Control Lists
In this chapter
•ACL overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 897
•How hardware-based ACLs work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 899
•Configuration considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 900
•Configuring standard numbered ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 901
•Configuring standard named ACLs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 903
•Configuring extended numbered ACLs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905
•Configuring extended named ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 911
•Preserving user input for ACL TCP/UDP port numbers . . . . . . . . . . . . . . . . 915
•Managing ACL comment text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 916
•Applying an ACL to a virtual interface in a protocol- or subnet-based VLAN 917
•Enabling ACL logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 917
•Enabling strict control of ACL filtering of fragmented packets . . . . . . . . . . 919
•Enabling ACL support for switched traffic in the router image. . . . . . . . . . 920
•Enabling ACL filtering based on VLAN membership or VE port membership 920
•Filtering on IP precedence and ToS values . . . . . . . . . . . . . . . . . . . . . . . . . 922
•QoS options for IP ACLs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 923
•ACL-based rate limiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 925
•Using ACLs to control multicast features . . . . . . . . . . . . . . . . . . . . . . . . . . . 925
•Enabling and viewing hardware usage statistics for an ACL . . . . . . . . . . . 925
•Displaying ACL information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 926
•Troubleshooting ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 926
ACL overview
This chapter describes how Access Control Lists (ACLs) are implemented and configured in the
devices.
Devices support rule-based ACLs (sometimes called hardware-based ACLs), where the decisions to
permit or deny packets are processed in hardware and all permitted packets are switched or routed
in hardware. All denied packets are also dropped in hardware. In addition, devices support
inbound ACLs only. Outbound ACLs are not supported.
NOTE
Devices support hardware-based ACLs only. These devices do not support flow-based ACLs.