Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 10 Current »

Use the acl command to restrict users' access to NetMRI to a list of IP addresses or subnets, thereby reducing the likelihood of unauthorized access. By default, the appliance accepts user connections via HTTP (port 80), HTTPS (port 443), SSH (port 22), and SYSLOG (port 514). If an access control list is defined, any or all of these ports can be restricted to a specific list of IP addresses.

Syntax

The following is the command syntax:

acl [commit|list|flush|reload|accept|reject|delete|exit]

The following table describes the subcommands of the acl command.

SubcommandDescription
listLists all ACL entries.
flushClears all ACL entries (no access restrictions).
acceptAccepts connections from a given CIDR block
rejectRejects connections from a given CIDR block.
commitSaves the ACL and makes it active.
deleteDeletes the existing access rules.

reload 

Clears working entries and reloads from disk.
exitExits the ACL mode.

The accept, delete, and reject commands accept the following arguments:

accept <CIDR> 22|69|80|443|514|ssh|tftp|http|https|syslog|all

reject <CIDR> 22|69|80|443|514|ssh|tftp|http|https|syslog|all

delete <CIDR> 22|69|80|443|514|ssh|tftp|http|https|syslog

where <CIDR> is formatted as A.B.C.D/NN or <IPv6 Address>/<Prefix>.

For example, the following commands:

flush

accept 192.168.12.0/24

all commit

would allow connections from any host in the specified subnet to any of the access ports supported by NetMRI. If you'd like to exclude specific hosts from a range of addresses, you should use one or more reject commands before the accept command as in the following example:

flushreject 192.168.12.66/32 all

reject 192.168.12.99/32 all

accept 192.168.12.0/24 all commit

If at least one ACL entry is defined, all access attempts other than those specifically listed are rejected; if no ACL entries are defined, all access attempts are accepted.

  • No labels