Maximum number of ACL's that can be configured on any DELL N-Series switches is 100 and maximum number if rules that can be configured per ACL is 1023
ACL configuration consists of following steps:
1. Create access-group specifying ACL rules in the order to be executed using sequence number. Rules are executed from lowest to highest sequence number
2. Assign the access-group to the interface that is supposed to filter ingress or egress traffic
Example:
An example is considered to better demonstrate the function of ACL's. Let us consider that incoming traffic at port gi1/0/10 subject to ACL that blocks udp traffic from network 10.10.10.0 255.255.255.0 destined to 10.10.20.0 255.255.255.0 subnet, blocks icmp packets from subnet 192.168.1.0 255.255.255.0 destined to any network, deny tcp traffic specific to telnet protocol from a particular host 172.16.1.10 subnet destined to any network and log the rule hits over console.
1. Create access group
Command |
Purpose |
Dell# configure |
Enter global configuration mode |
Dell(config)# ip access-list ACL-TEST |
Create access group by giving it a name. Here access group ACL-TEST is created. ACL names can contain letters, numbers, dot, dash or underscore, but should start with a letter only, and it should be less than or equal to 31 characters long |
Dell(config-ip-acl)# 10 deny udp 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255 log |
Enter the first rule make sure it has the lowest sequence number, here sequence number 10 is given. This rule denies udp traffic from the source 10.10.10.0 subnet (according to the syntax, wildcard mask 0.0.0.25 is entered) destined to 10.10.10.20. if the rule matches the action is logged on the console |
Dell(config-ip-acl)# 20 deny icmp 192.168.1.0 0.0.0.255 any log |
Second rule is entered with sequence number 20, denies icmp traffic form 192.168.1.0 subnet destined to any network and log if the rule hit occurs |
Dell(config-ip-acl)# 30 deny tcp 172.16.1.0 0.0.0.255 any eq telnet log |
Enter third rule with sequence number 30 that specifies to deny any tcp traffic related to telnet protocol destined to any network sourced from 172.16.1.0 network and log if any rule match occurs |
2. Apply access-group to the interface
Command |
Purpose |
Dell# configure |
Enter global configuration mode |
Dell(config)# interface gigabitethernet 1/0/10 |
Enter the interface specific configuration mode |
Dell(config-if-Gi1/0/10)# ip access-group ACL-TEST in 10 |
Apply the access-group to the interface, such that all the ingress or incoming traffic is subjected to the rules in the access-group. If there are more than one access-groups then assign sequence number so that the access-groups can be applied in the order of lowest to highest sequence numbers. If no sequence number is specified, the access-groups are auto assigned with sequence number, fist access-group specified takes the lowest value |
ACL verification commands listed below:
Dell#show ip access-lists
Current number of ACLs: 1 Maximum number of ACLs: 100
ACL Name Rules Interface(s) Direction Count
---------------------------------- -------- ------------------------- ----------------- ------
ACL-TEST 3 Gi1/0/10 Inbound 12
Dell#show ip access-lists ACL-TEST
IP ACL Name: ACL-TEST
Dell#show running-config | begin access
ip access-list ACL-TEST
10 deny udp 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255 log
To implement MAC ACL, please follow the link: https://kb.dell.com/infocenter/index?page=content&id=HOW12466