Product guide

10-111
Access Control Lists (ACLs)
Enable ACL “Deny” Logging
Enabling ACL Logging on the Switch
1. If you are using a Syslog server, use the logging < ip-addr > command to
configure the Syslog server IP address(es). Ensure that the switch can
access any Syslog server(s) you specify.
2. Use logging facility syslog to enable the logging for Syslog operation.
3. Use the debug destination command to configure one or more log destina-
tions. (Destination options include logging, session, and windshell. For
more information on debug, refer to “Debug and Syslog Messaging Oper-
ation” in appendix C, “Troubleshooting”, in the Management and Config-
uration Guide for your switch.)
4. Use debug acl or debug all to configure the debug operation to include ACL
messages.
5. Configure one or more ACLs with the deny action and the log option.
For example, suppose that you want to configure the following operation:
On VLAN 10 configure an extended ACL with an ACL-ID of “NO-
TELNET” and use the RACL in option to deny Telnet traffic entering
the switch from IP address 10.10.10.3 to any routed destination. (Note
that this assignment will not filter Telnet traffic from 10.10.10.3 to
destinations on VLAN 10 itself.)
Configure the switch to send an ACL log message to the current
console session and to a Syslog server at IP address 10.10.20.3 on
VLAN 20 if the switch detects a packet match denying a Telnet attempt
from 10.10.10.3.
(This example assumes that IP routing is already configured on the switch.)
Figure 10-43. Example of an ACL Log Application
VLAN 20
10.10.20.1
Subnet 20
10.10.20.3
VLAN 10
10.10.10.1
10.10.10.3
Subnet 10
Syslog Server
Apply the extended ACL “NO TELNET” as a
RACL here to deny Telnet access to inbound,
routed Telnet traffic from IP address
10.10.10.3.
Block Telnet access to routed
destinations from this host.
Switch
Console
Console RS-232 Port