Qtech QSW-2900-24T-AC [131/209] Monitor and maintanence of acl

8-129
Defining user-defined ACL rule(user-defined ACL with name ID configuration mode)
{ permit | deny } { rule-string rule-mask offset }&<1-13> [ ingress interface interface-num ]
[source-vid vid] [ time-range time-range-name ]
Delete all the subitems or one subitem in one ACL with number ID or name ID or all ACLs (global
configuration mode)
no access-list { all | { access-list-number | name access-list-name } [ subitem ] }
Use { permit | deny } command repeatedly to define more rules for the same ACL. Create a user-defined ACL
with the name of access-list-name and enter it. access-list-name is character string parameter with initial English
letters (that is [a-z, A-Z]) with any kind, excluding space and quotation mark; all, any are not allowed. Use
match-order to specify the matching order, whether it is according to user configuration or deep precedency
(precedent to match the rule with the small range). If it is not specified, it is defaulted to be user configuration order.
Once user specifies the matching order of an ACL, it cannot be changed, unless delete all subitems of this ACL
before respecify the order.
Concrete parameter meaning refers to corresponded command line.
8.3.7 Activate ACL
After activating ACL, it can be effective. Use access-group command to activate accessing control list.
Configure it in global configuration mode.
Activate ACL
access-group { user-group { access-list-number | access-list-name } [ subitem subitem ] |
{ [ ip-group { access-list-number | access-list-name } [ subitem subitem ] ] [ link-group
{ access-list-number | access-list-name } [ subitem subitem ] ] } }
Cancel activating ACL
no access-group { all | user-group { access-list-number | access-list-name } [ subitem subitem ] |
{ [ ip-group { access-list-number | access-list-name } [ subitem subitem ] ] [ link-group
{ access-list-number | access-list-name } [ subitem subitem ] ] } }
Instruction:
This command supports activating accessing control list of layer 2 and layer 3 at the same time, but the action
of each accessing control list should not be conflict, if there is conflict (such as one is permit, the other is deny), the
activation fails. Switch uses straight through to activate layer 2 and layer 3 ACL, that is, subitem 1 of layer 2 ACL
and layer 3 ACL combine together, and the rest may be deduced by analogy; if the number of two groups of ACL
is not the same, the rest subitem can activate separately.
8.4 Monitor and maintanence of ACL
Configure followings in any configuration mode except user mode.
Display time information
show time-range [ all | statistic | name time-range-name ]
Display detail information of ACL
show access-list config { all | access-list-number | name access-list-name }
Display statistic information of ACL
show access-list config statistic
Display runtime information of ACL
show access-list runtime { all | access-list-number | name access-list-name }
Display runtime statistic information of ACL

Содержание

Скачать
Случайные обсуждения