Patton electronic SmartNode 4110 Series ユーザーズマニュアル

ページ / 664
Access control list configuration task list
261
SmartWare Software Configuration Guide 
24 • Access control list configuration
The same effect can also be obtained by using the simpler message name option. See the following example.
node(cfg)#profile acl WanRx
node(pf-acl)[WanRX]#deny icmp any any msg echo
node(pf-acl)[WanRX]#exit
node(cfg)#
Adding a TCP, UDP or SCTP filter rule to the current access control list profile
The commands permit or deny are used to define a TCP, UDP or SCTP filter rule. Each TCP, UDP or SCTP 
filter rule represents a respective access of control list entry.
This procedure describes how to create a TCP, UDP or SCTP access control list entry that permits access
Mode: Profile access control list
This procedure describes how to create a TCP, UDP or SCTP access control list entry that denies access
Mode: Profile access control list
Step
Command
Purpose
1
node(pf-acl)[name]#permit {tcp | udp | sctp} {src src-wild-
card
 | any | host src} [{eq port | gt port | lt port | range 
from to}] {dest dest-wildcard | any | host dest} [{eq port | gt 
port | lt port | range from to}] [{cos group | cos-rtp group-
data group-ctrl
}]
Creates a TCP, UDP or SCTP 
access of control list entry that 
permits access defined according 
to the command options
Step
Command
Purpose
1
node(pf-acl)[name]#deny {tcp | udp | sctp} {src src-
wildcard
 | any | host src} [{eq port | gt port | lt port | 
range 
from to}] {dest dest-wildcard | any | host dest} [{eq 
port | gt port | lt port | range from to}] [{cos group | cos-
rtp 
group-data group-ctrl}]
Creates a TCP, UDP or SCTP 
access of control list entry that 
denies access defined according 
to the command options