EasyManua.ls Logo

HP 2530 User Manual

HP 2530
111 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #81 background imageLoading...
Page #81 background image
PageExampleTask
The deny and permit keywords use the options shown above for "Create
an IPv6 ACL".
89HP Switch(config)# ipv6 access-list <name-str>Deleting an ACE from an existing
ACL
HP Switch(config-ipv6-acl)# no <seq-#> [remark]
NOTE: You can also delete an ACE by entering no <permit|deny>
followed by the settings explicitly configured for that ACE.
90HP Switch(config)# ipv6 access-list resequence
<name-str>
<starting-#> <increment>
Resequence the ACEs in an ACL
91HP Switch(config)# ipv6 access-list <name-str>Enter a remark
Remove a remark:
HP Switch(config-ipv6-acl)# remark <remark-str>
HP Switch(config-ipv6-acl)# no remark
Immediately after entry
HP Switch(config-ipv6-acl)# no <seq-#> remark
After entry of an ACE
86HP Switch(config)# no ipv6 access-list <name-str> vlanDelete an IPv6 ACL
HP Switch(config)# no ipv6 access-list <name-str>
1
TCP only
2
TCP flag (control bit) options for destination TCP
3
The log function applies to both deny” and permit ACLs, and generates a message when there is either a deny”
match or a permit” match.
Enabling, disabling, and displaying ACLs
PageExampleTask
HP Switch(config)# [no] vlan <vid> ipv6 access-group
<name-str> vlan
Enable or disable an IPv6 VACL
HP Switch(config)# [no] interface <port-list | trkx>
ipv6 access-group <name-str> in
HP Switch (eth- <port-list) | trkx>)# [no] ipv6
access-group <name-str> in
Enable or disable a static port ACL
94HP Switch# show access-list
HP Switch# show access-list <acl-name-str> [config]
HP Switch# show access-list config
HP Switch# show access-list ports <port-list | trkx>
HP Switch# show access-list vlan <vid>
HP Switch# show access-list radius <port-list> |
all>
HP Switch# show access-list resources
Displaying ACL configuration data
Creating, entering, and configuring an ACL
For a match to occur with an ACE, a packet must have the source and destination IPv6 address
criteria specified by the ACE.
Use the following steps to create or add to an ACL:
1. Create and/or enter the context of a given ACL.
2. Enter the first ACE in a new ACL, or append an ACE to the end of an ACL.
Syntax: (ipv6 ACL context)
ipv6 access-list <ascii-str>
Configuration commands 81

Table of Contents

Other manuals for HP 2530

Question and Answer IconNeed help?

Do you have a question about the HP 2530 and is the answer not in the manual?

HP 2530 Specifications

General IconGeneral
LayerLayer 2
Operating Temperature32°F to 113°F (0°C to 45°C)
ModelHP 2530
Power over Ethernet (PoE)PoE+
ManagementWeb interface, CLI, SNMP
Memory128 MB flash
Input Voltage100-240 VAC
Jumbo Frame SupportYes
Operating Humidity15% to 95% non-condensing

Summary

1 Updates for the HP Switch Software Access Security Guide

Configuring advanced threat protection

Covers advanced threat protection features like DHCP snooping, Dynamic ARP protection, and Instrumentation monitor.

DHCP snooping

Details DHCP snooping for preventing DoS attacks by distinguishing trusted and untrusted ports.

Dynamic ARP protection

Explains how to protect networks from ARP poisoning attacks using dynamic ARP protection.

Dynamic IP Lockdown

This feature prevents IP source address spoofing by enforcing IP-to-MAC bindings.

Using the instrumentation monitor

How to use the instrumentation monitor to detect security anomalies and irregular operations.

Configuring RADIUS server support for switch services

Introduction

Explains configuring CoS, rate-limiting, and ACL client services via a RADIUS server.

Configuring and using dynamic (RADIUS-assigned) access control lists

Describes applying RADIUS-assigned ACLs to filter IP traffic from authenticated clients.

2 Updates for the HP Switch Software IPv6 Configuration Guide

Access Control Lists (ACLs)

Details configuring, applying, and editing static IPv6 ACLs for traffic filtering.

ACL applications

Covers filtering traffic from hosts, subnets, and applying ACLs at network edges.

RADIUS-assigned ACLs

Explains ACLs configured on a RADIUS server and assigned to authenticated clients.

Planning and configuring ACLs

Outlines steps for identifying ACL actions, designing ACLs, and applying them.

ACL operation

Describes how ACLs apply to ports, trunks, and filter traffic types.

Guidelines for planning ACL structure

Covers determining ACL application points and the order of ACEs for resource efficiency.

ACL configuration structure

Details the basic structure of an ACL, including identity, remarks, and ACEs.

Related product manuals