Solved

How do I make this ACL on an HP Procurve?

Posted on 2010-11-24
6
4,219 Views
Last Modified: 2012-05-10
I have an HP Procurve switch that I want to set up an ACL on. I have a host on my network that I want to restrict the access to. Say it's 10.10.47.10. I want to block ALL traffic except for a short list of IPs which I want to have un-restricted access to that host. The IPs are not contigious so I can't use a range. I'd need to be able to enter them one at a time. Which is possible though tedious I believe. It's only about 5-6 IPs that need access to this host though. So in short I need an ACL to specifically allow these 5-6 IPs full access, and then a corresponding Deny All for everything else. This will all be applied to a specific port not globally. Any ideas?
0
Comment
Question by:CCB-Tech
  • 3
  • 2
6 Comments
 
LVL 11

Expert Comment

by:diprajbasu
ID: 34208039
0
 

Author Comment

by:CCB-Tech
ID: 34208067
The problem with that guide is that I have an HP 5406zl. It does not have a gui for configuration of ACLs. At least not through the web interface. So I need to be able to do it from command line.
0
 
LVL 50

Accepted Solution

by:
Don Johnston earned 500 total points
ID: 34208578
You don't state if the 5-6 hosts are the same vlan or a different vlan.

EIther way, ACL statements would be similar enough.

conf t
ip access-list Homer
 10 permit ip 10.10.47.10 0.0.0.0 10.10.47.5 0.0.0.0 
 20 permit ip 10.10.47.10 0.0.0.0 10.10.47.51 0.0.0.0
 30 permit ip 10.10.47.10 0.0.0.0 10.10.47.75 0.0.0.0
int b10
 ip access-group Homer in
end
write mem

Open in new window

0
Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

 

Author Comment

by:CCB-Tech
ID: 34217868
Excellent Don! That is very helpful. All the IP's to be blocked are on the same VLAN. So the first half of the Permit IP is the target IP, and the second is the allowed IP correct? Also, would this be the block command that would be at the end?

40 deny ip any any

Does that look correct?

Thanks!
0
 
LVL 50

Assisted Solution

by:Don Johnston
Don Johnston earned 500 total points
ID: 34217940
The first address is the source IP address, the second is the destination.

Your line 40 not needed as there is an "implicit deny any" at the end of every ACL.
0
 

Author Closing Comment

by:CCB-Tech
ID: 34218040
Excellent, thank you very much for your help. Expect to see a few more of these type questions in the future :). I had forgotten about the implicit deny at the end. I just tested it out and it works a treat!

Thanks for all your help dude!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Simple Network: And the Default Gateway is? 5 65
Dell M6220 to Dell 6224 Port channel conundrum 5 27
two domains and two exch2013 6 32
Unifi AP 4 51
Hello to you all, I hear of many people congratulate AWS (Amazon Web Services) on how easy it is to spin up and create new EC2 (Elastic Compute Cloud) instances, but then fail and struggle to connect to them using simple tools such as SSH (Secure…
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now