Solved

How do I make this ACL on an HP Procurve?

Posted on 2010-11-24
6
4,356 Views
Last Modified: 2012-05-10
I have an HP Procurve switch that I want to set up an ACL on. I have a host on my network that I want to restrict the access to. Say it's 10.10.47.10. I want to block ALL traffic except for a short list of IPs which I want to have un-restricted access to that host. The IPs are not contigious so I can't use a range. I'd need to be able to enter them one at a time. Which is possible though tedious I believe. It's only about 5-6 IPs that need access to this host though. So in short I need an ACL to specifically allow these 5-6 IPs full access, and then a corresponding Deny All for everything else. This will all be applied to a specific port not globally. Any ideas?
0
Comment
Question by:CCB-Tech
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 11

Expert Comment

by:DIPRAJ
ID: 34208039
0
 

Author Comment

by:CCB-Tech
ID: 34208067
The problem with that guide is that I have an HP 5406zl. It does not have a gui for configuration of ACLs. At least not through the web interface. So I need to be able to do it from command line.
0
 
LVL 50

Accepted Solution

by:
Don Johnston earned 500 total points
ID: 34208578
You don't state if the 5-6 hosts are the same vlan or a different vlan.

EIther way, ACL statements would be similar enough.

conf t
ip access-list Homer
 10 permit ip 10.10.47.10 0.0.0.0 10.10.47.5 0.0.0.0 
 20 permit ip 10.10.47.10 0.0.0.0 10.10.47.51 0.0.0.0
 30 permit ip 10.10.47.10 0.0.0.0 10.10.47.75 0.0.0.0
int b10
 ip access-group Homer in
end
write mem

Open in new window

0
NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

 

Author Comment

by:CCB-Tech
ID: 34217868
Excellent Don! That is very helpful. All the IP's to be blocked are on the same VLAN. So the first half of the Permit IP is the target IP, and the second is the allowed IP correct? Also, would this be the block command that would be at the end?

40 deny ip any any

Does that look correct?

Thanks!
0
 
LVL 50

Assisted Solution

by:Don Johnston
Don Johnston earned 500 total points
ID: 34217940
The first address is the source IP address, the second is the destination.

Your line 40 not needed as there is an "implicit deny any" at the end of every ACL.
0
 

Author Closing Comment

by:CCB-Tech
ID: 34218040
Excellent, thank you very much for your help. Expect to see a few more of these type questions in the future :). I had forgotten about the implicit deny at the end. I just tested it out and it works a treat!

Thanks for all your help dude!
0

Featured Post

IoT Devices - Fast, Cheap or Secure…Pick Two

The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. Can you be sure that your devices do what they're supposed to do, while still being secure?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
Arrow Electronics was searching for a KVM  (Keyboard/Video/Mouse) switch that could display on one single monitor the current status of all units being tested on the rack.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

628 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question