Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How do I make this ACL on an HP Procurve?

Posted on 2010-11-24
6
Medium Priority
?
4,388 Views
Last Modified: 2012-05-10
I have an HP Procurve switch that I want to set up an ACL on. I have a host on my network that I want to restrict the access to. Say it's 10.10.47.10. I want to block ALL traffic except for a short list of IPs which I want to have un-restricted access to that host. The IPs are not contigious so I can't use a range. I'd need to be able to enter them one at a time. Which is possible though tedious I believe. It's only about 5-6 IPs that need access to this host though. So in short I need an ACL to specifically allow these 5-6 IPs full access, and then a corresponding Deny All for everything else. This will all be applied to a specific port not globally. Any ideas?
0
Comment
Question by:CCB-Tech
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 11

Expert Comment

by:DIPRAJ
ID: 34208039
0
 

Author Comment

by:CCB-Tech
ID: 34208067
The problem with that guide is that I have an HP 5406zl. It does not have a gui for configuration of ACLs. At least not through the web interface. So I need to be able to do it from command line.
0
 
LVL 50

Accepted Solution

by:
Don Johnston earned 2000 total points
ID: 34208578
You don't state if the 5-6 hosts are the same vlan or a different vlan.

EIther way, ACL statements would be similar enough.

conf t
ip access-list Homer
 10 permit ip 10.10.47.10 0.0.0.0 10.10.47.5 0.0.0.0 
 20 permit ip 10.10.47.10 0.0.0.0 10.10.47.51 0.0.0.0
 30 permit ip 10.10.47.10 0.0.0.0 10.10.47.75 0.0.0.0
int b10
 ip access-group Homer in
end
write mem

Open in new window

0
Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

 

Author Comment

by:CCB-Tech
ID: 34217868
Excellent Don! That is very helpful. All the IP's to be blocked are on the same VLAN. So the first half of the Permit IP is the target IP, and the second is the allowed IP correct? Also, would this be the block command that would be at the end?

40 deny ip any any

Does that look correct?

Thanks!
0
 
LVL 50

Assisted Solution

by:Don Johnston
Don Johnston earned 2000 total points
ID: 34217940
The first address is the source IP address, the second is the destination.

Your line 40 not needed as there is an "implicit deny any" at the end of every ACL.
0
 

Author Closing Comment

by:CCB-Tech
ID: 34218040
Excellent, thank you very much for your help. Expect to see a few more of these type questions in the future :). I had forgotten about the implicit deny at the end. I just tested it out and it works a treat!

Thanks for all your help dude!
0

Featured Post

Will your db performance match your db growth?

In Percona’s white paper “Performance at Scale: Keeping Your Database on Its Toes,” we take a high-level approach to what you need to think about when planning for database scalability.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Security is one of the biggest concerns when moving and migrating your data from your on-premise location to the Public Cloud.  Where is your data? Who can access it? Will it be safe from accidental deletion?  All of these questions and more are imp…
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question