13.07.2015 Views

Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support

Administration of the Avaya G350 Media Gateway - Avaya Support

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Defining rulesThe composite command can be any command defined in <strong>the</strong> composite operation list. Thesecommands are case-sensitive. To view <strong>the</strong> composite operation list for <strong>the</strong> access control listyou are working with, type <strong>the</strong> command show composite-operation in <strong>the</strong> context <strong>of</strong> <strong>the</strong>access control list.The following example defines a rule in Access Control List 301 that denies access to allincoming packets that contain IP fragments:<strong>G350</strong>-001(super)# ip access-control-list 301<strong>G350</strong>-001(super/ACL 301)# ip-fragments-in DenyDone!Defining rulesThis section provides information on how to configure rules in a policy list and contains <strong>the</strong>following topics:●●●Overview <strong>of</strong> rule criteria — an overview <strong>of</strong> <strong>the</strong> criteria that can be used in configuring policyrulesEditing and creating rules — instructions on how to edit or create a policy ruleRule criteria — instructions on how to configure a policy rule’s criteriaOverview <strong>of</strong> rule criteriaYou can configure policy rules to match packets based on one or more <strong>of</strong> <strong>the</strong> following criteria:●●●●●Source IP address, or a range <strong>of</strong> addressesDestination IP address or a range <strong>of</strong> addressesIP protocol, such as TCP, UDP, ICMP, IGMPSource TCP or UDP port or a range <strong>of</strong> portsDestination TCP or UDP port or a range <strong>of</strong> ports● ICMP type and codeUse IP wildcards to specify a range <strong>of</strong> source or destination IP addresses. The zero bits in <strong>the</strong>wildcard correspond to bits in <strong>the</strong> IP address that remain fixed. The one bits in <strong>the</strong> wildcardcorrespond to bits in <strong>the</strong> IP address that can vary. Note that this is <strong>the</strong> opposite <strong>of</strong> how bits areused in a subnet mask.For access control lists, you can require <strong>the</strong> packet to be part <strong>of</strong> an established TCP session. If<strong>the</strong> packet is a request for a new TCP session, <strong>the</strong> packet does not match <strong>the</strong> rule. You can alsospecify whe<strong>the</strong>r an access control list accepts packets that have an IP option field.Issue 3 January 2005 261

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!