EasyManua.ls Logo

HP 2530 User Manual

HP 2530
111 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #89 background imageLoading...
Page #89 background image
Example 33 Inserting an ACE in an existing ACL
From the global configuration context:
1. Insert a new ACE with a sequence number of 45 between the ACEs numbered 40 and 50
shown in Appending an ACE to an existing list” (page 88).
Inserting an ACE in an existing ACL
HP Switch(Config)# ipv6 access-list My-list
1
HP Switch(config-ipv6-acl)# 45 permit icmp host 2001:db8:0:5ad::33 ::/0
2
HP Switch(config-ipv6-acl)# show run
. . .
ipv6 access-list "My-list"
10 permit ipv6 2001:db8:0:5ad::25/128 ::/0
20 permit ipv6 2001:db8:0:5ad::111/128 ::/0
30 permit icmp 2001:db8:0:5ad::115/128 ::/0
40 permit icmp 2001:db8:0:5ad::/64 ::/0
45 permit icmp 2001:db8:0:5ad::33 ::/0
3
50 permit icmp 2001:db8:0:5ad::19/128 ::/0
60 permit ipv6 ::/0 2001:db8:0:5ad::1/128
70 deny ipv6 2001:db8:0:5ad::/64 ::/0
80 permit ipv6 ::/0 ::/0
exit
2
3
1
Inserts a new ACE
assigned to line 45
Enters the
Named-ACL context
for “My-list
2. In the context of an IPv6 ACL named List-01, insert a new ACE between two existing ACEs.
In this example, the first command creates a new ACL and enters the ACL context. The next
two ACEs entered become lines 10 and 20 in the list. The third ACE entered is inserted
between lines 10 and 20 using a sequence command with sequence number 11.
Inserting an ACE into an existing sequence
HP Switch(config)# Port_1_5400(config)# ipv6 access-list List-01
1
HP Switch(config-ipv6-acl)# permit ipv6 host fe80::100 host fe80::200
2
HP Switch(config-ipv6-acl)# permit ipv6 host fe80::103 any
HP Switch(config-ipv6-acl)# 11 permit ipv6 host fe80::110 host fe80::
3
HP Switch(config-ipv6-acl)# show run
Running configuration:
. . .
ipv6 access-list "List-01"
10 permit ipv6 fe80::100/128 fe80::200/128
11 permit ipv6 fe80::110/128 fe80::210/128
20 permit ipv6 fe80::103/128 ::/0
4
exit
1
Becomes Line 10
2
Becomes Line 20
3
4
Lines 10 and 20 were automatically numbered according to their order of entry in
the list.
Line 11 was explicitly numbered by the 11 permit command and was inserted in its
proper place in the list.
Deleting an ACE from an existing ACL
To delete and ACE, you can use either the sequence number of an ACE or the syntax of the ACE.
Editing an existing ACL 89

Table of Contents

Other manuals for HP 2530

Question and Answer IconNeed help?

Do you have a question about the HP 2530 and is the answer not in the manual?

HP 2530 Specifications

General IconGeneral
LayerLayer 2
Operating Temperature32°F to 113°F (0°C to 45°C)
ModelHP 2530
Power over Ethernet (PoE)PoE+
ManagementWeb interface, CLI, SNMP
Memory128 MB flash
Input Voltage100-240 VAC
Jumbo Frame SupportYes
Operating Humidity15% to 95% non-condensing

Summary

1 Updates for the HP Switch Software Access Security Guide

Configuring advanced threat protection

Covers advanced threat protection features like DHCP snooping, Dynamic ARP protection, and Instrumentation monitor.

DHCP snooping

Details DHCP snooping for preventing DoS attacks by distinguishing trusted and untrusted ports.

Dynamic ARP protection

Explains how to protect networks from ARP poisoning attacks using dynamic ARP protection.

Dynamic IP Lockdown

This feature prevents IP source address spoofing by enforcing IP-to-MAC bindings.

Using the instrumentation monitor

How to use the instrumentation monitor to detect security anomalies and irregular operations.

Configuring RADIUS server support for switch services

Introduction

Explains configuring CoS, rate-limiting, and ACL client services via a RADIUS server.

Configuring and using dynamic (RADIUS-assigned) access control lists

Describes applying RADIUS-assigned ACLs to filter IP traffic from authenticated clients.

2 Updates for the HP Switch Software IPv6 Configuration Guide

Access Control Lists (ACLs)

Details configuring, applying, and editing static IPv6 ACLs for traffic filtering.

ACL applications

Covers filtering traffic from hosts, subnets, and applying ACLs at network edges.

RADIUS-assigned ACLs

Explains ACLs configured on a RADIUS server and assigned to authenticated clients.

Planning and configuring ACLs

Outlines steps for identifying ACL actions, designing ACLs, and applying them.

ACL operation

Describes how ACLs apply to ports, trunks, and filter traffic types.

Guidelines for planning ACL structure

Covers determining ACL application points and the order of ACEs for resource efficiency.

ACL configuration structure

Details the basic structure of an ACL, including identity, remarks, and ACEs.

Related product manuals