User Manual

Chapter 3 - Operation and Administration of the Macro BTS NPU Configuration
4Motion 197 System Manual
You can create the following types of rules for an ACL:
Permit: Indicates that traffic matching the filter criteria is allowed to reach the
NPU or AUs.
Deny: Indicates that traffic matching the filter criteria is dropped, and not
allowed to reach the NPU or AUs.
You can configure multiple rules for each ACL; the priority for these rules is
applied with respect to the sequence in which these rules are configured. The first
configured rule is the first one to be checked for a match, and so on. After you
configure an ACL, you can attach the ACL to either the NPU or the AUs or both
NPU and AUs.
All ACLs are either in the ACTIVE or INACTIVE state. The ACTIVE state indicates
that the ACL is attached to one or more interfaces; the INACTIVE state indicates
that the ACL is not attached to any interface. The priority of checking for a match
in active ACLs is applied with respect to the sequence in which these ACLs were
attached to the relevant interface. The first found match is applied. To change the
priories of ACLs you need to de-attach them from the relevant interface(s) and
then re-attach them in the required order.
To see the current order of ACLs attached to a certain interface, run the
command: npu# show interface npu-host | all-au.
By default, traffic towards the AUs is not restricted. This is implemented through
ACL 1 which is available by default. ACL 1 is attached to AUs, with Rule Action =
Permit, Source IP Address = Any and Destination IP Address = Any.
All the following automatically created standard default ACLs are attached to the
NPU virtual interface and include a single Permit rule:
IMPORTANT
You can use extended ACL 199 to configure QoS classification rules for classifying traffic originating
from the NPU into different flows. For details, refer “Configuring QoS Marking Rules” on
page 177
).
Table 3-16: Default Standard ACLs
ACL Number Rule Action Source IP Address Destination IP Address
ACL 96 Permit Any Internal Management IP address
ACL 97 Permit Any External Management IP address
ACL 98 Permit Any Local Management IP address