Product guide

Access Control Lists (ACLs) for the Series 5300xl Switches
Enable ACL “Deny” Logging
summary of any additional “deny” matches for that ACE (and any other “deny”
ACEs for which the switch detected a match). If no further log messages are
generated in the wait-period, the switch suspends the timer and resets itself
to send a message as soon as a new “deny” match occurs. The data in the
message includes the information illustrated in figure 9-26.
Mar 1 10:04:45 18.28.227.101 ACL:
ACL 03/01/03 10:04:45: denied tcp 13.28.227.3 (1025) (VLAN 227) -> 10.10.20.2 (23), 1 packets
Indicates the VLAN on which the
ACL is assigned, the packet’s
destination IP address, the
destination TCP or UDP port
number (“0” if the protocol is “IP”
or you do not specify a port
Begins the actual
message generated
by the ACL itself, and
indicates message
type (ACL), date and
time of generation.
Note: To fit this illustration on the page, the portion of the message generated by
the Syslog server itself is shown in the line above the portion of the message
generated by the switch. Depending on the terminal emulator you use, you may
see information similar to this, which includes the date and time the log message
was received, the IP address of the default VLAN on the sending switch, and the
message type (ACL).
ACL action (denied), protocol type
(IP, TCP, or UDP), source IP address
of the denied packet(s) and the TCP
or UDP port number at the source
device. The port number is “0” if the
protocol is “IP” or you do not specify
a port number.
Indicates the
number of
packets (deny
instances)
detected.
Figure 9-26. Content of an ACL-Generated Message
Enabling ACL Logging on the Switch
1. Use the debug command to:
a. Configure one or more log destinations.
b. If you are using a Syslog server, use the logging command to configure
the server’s IP address. (You can configure up to six Syslog servers.)
c. Ensure that the switch can access any Syslog servers you specify.
2. Configure one or more ACLs with the deny action and the log option.
For example, suppose that you want to:
On VLAN 100 configure an extended ACL with an ACL-ID of 143 to
deny Telnet traffic from IP address 18.38.100.127 on VLAN 100.
Configure the switch to send an ACL log message to the console and
to a Syslog server at IP address 18.38.110.54 on VLAN 110 if the switch
detects a match denying Telnet access from 18.38.100.127.
(This example assumes that IP routing is already configured on the switch.)
9-60