Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The following table describes the subcommands of the acl command.

...

SubcommandDescription
list

Lists all ACL entries.

The command does not take any arguments.

flush

Clears all ACL entries (no access restrictions).

The command does not take any arguments.

accept

Accepts connections from a given CIDR block

rejectRejects connections from a given CIDR block.deleteDeletes the existing access rules.

reload 

Clear working entries and reload from disk

.

exit

Exits the ACL mode.

...

The command takes the following arguments:

accept <CIDR> 22|69|80|443|514|ssh|tftp|http|https|syslog|all

where <CIDR> is formatted as A.B.C.D/NN or <IPv6 Address>/<Prefix>.

reject

Rejects connections from a given CIDR block.

The command takes the following arguments:

reject <CIDR> 22|69|80|443|514|ssh|tftp|http|https|syslog|all

where <CIDR> is formatted as A.B.C.D/NN or <IPv6 Address>/<Prefix>.

commit

Saves the ACL and makes it active.

The command does not take any arguments.

delete

Deletes the existing access rules.

The command takes the following arguments:

delete <CIDR> 22|69|80|443|514|ssh|tftp|http|https|syslog

where <CIDR> is formatted as A.B.C.D/NN or <IPv6 Address>/<Prefix>.

For example, the following commands:

flush

accept 192.168.12.0/24

all commit

...

reload 

Clears working entries and reloads from disk.

The command does not take any arguments.

exit

Exits the ACL mode.

The command does not take any arguments.

Examples

The following commands would allow connections from any host in the specified subnet to any of the access ports supported by NetMRI:

flush

accept 192.168.12.0/24 all

commit

If you'd like to exclude specific hosts from a range of addresses, you should use one or more reject commands before the accept command as in the following example:

flush

flushreject reject 192.168.12.66/32 all

reject 192.168.12.99/32 all

accept 192.168.12.0/24 all

commit

If at least one ACL entry is defined, all access attempts other than those specifically listed are rejected; if no ACL entries are defined, all access attempts are accepted.