Release Notes
Usage Guidelines
Session ACLs define traffic and firewall policies on the controller. You can configure multiple rules for each
policy, with rules evaluated from top (1 is first) to bottom. The first match terminates further evaluation.
Generally, you should order more specific rules at the top of the list and place less specific rules at the bottom
of the list. The ACL ends with an implicit deny all. To configure IPv6 rules, use the ipv6 keyword followed by the
regular ACL keywords.
Example
The following command configures a session ACL that drops any traffic from 10.0.0.0 subnetwork:
ip access-list session drop-from10
network 10.0.0.0 255.0.0.0 any any
The following command configures a session ACL with IPv4 and IPv6 address:
(host) (config)#ip access-list session common
(host) (config-sess-common)#host 10.12.13.14 any any permit
(host) (config-sess-common)#ipv6 host 11:12:11:11::2 any any permit
The following example displays information for an ACL called mylist.
(host) (config) #show ip access-list mylist
ip access-list session mylist
mylist
---------
Priority Source Destination Service Application Action TimeRange Log Expired Queue
TOS 8021P Blacklist Mirror DisScan ClassifyMedia IPv4/6 Contract
-------- ------ ----------- ------- ----------- ------ --------- --- ------- ----- -
-- ----- --------- ------ ------- ------------- ------ --------
1 any any app gmail deny Low
4
Command History
Release Modification
ArubaOS 3.0 This command was introduced.
ArubaOS 6.3 The any tcp source parameter was introduced.
ArubaOS 6.4 The redirect parameter was introduced under action. The app, and appcat-
egory parameters were introduced under service.
ArubaOS 6.4.2.0
The web-cc-category and web-cc-reputation parameters were introduced,
allowing users to define an ACL for a web content category or web content
reputation type.
Command Information
Platform License Command Mode
Available on all platforms Requires the PEFNG license Config mode on master controllers
Dell Networking W-Series ArubaOS 6.4.x | Reference Guide ip access-list session | 442










