Skip to content

Service IPv4 Access Control List Feature

Configure access control lists (ACLs) to influence the traffic flowing in or out the service interfaces.

Diagram
NameTypeConstraintMandatoryDefault Value
ipv4_aclsList[ipv4_acls]No

ipv4_acls (sdwan.feature_profiles.service_profiles)

Section titled “ipv4_acls (sdwan.feature_profiles.service_profiles)”
NameTypeConstraintMandatoryDefault Value
nameStringRegex: ^[^&<>! "]{1,128}$Yes
descriptionStringNo
default_actionChoiceaccept, dropYes
sequencesList[sequences]No

sequences (sdwan.feature_profiles.service_profiles.ipv4_acls)

Section titled “sequences (sdwan.feature_profiles.service_profiles.ipv4_acls)”
NameTypeConstraintMandatoryDefault Value
idIntegermin: 1, max: 65536Yes
nameStringmin: 1, max: 19Noacl
base_actionChoiceaccept, dropYes
match_entriesClass[match_entries]No
actionsClass[actions]No

match_entries (sdwan.feature_profiles.service_profiles.ipv4_acls.sequences)

Section titled “match_entries (sdwan.feature_profiles.service_profiles.ipv4_acls.sequences)”
NameTypeConstraintMandatoryDefault Value
destination_data_prefixIPNo
destination_data_prefix_variableStringRegex: ^[./\[\]a-zA-Z0-9_-]{1,64}$No
destination_data_prefix_listStringRegex: ^[^&<>! "]{1,128}$No
destination_portsListInteger[min: 0, max: 65535]No
dscpsListInteger[min: 0, max: 63]No
icmp_messagesListChoice[administratively-prohibited, dod-host-prohibited, dod-net-prohibited, echo, echo-reply, echo-reply-no-error, extended-echo, extended-echo-reply, general-parameter-problem, host-isolated, host-precedence-unreachable, host-redirect, host-tos-redirect, host-tos-unreachable, host-unknown, host-unreachable, interface-error, malformed-query, multiple-interface-match, net-redirect, net-tos-redirect, net-tos-unreachable, net-unreachable, network-unknown, no-room-for-option, option-missing, packet-too-big, parameter-problem, photuris, port-unreachable, precedence-unreachable, protocol-unreachable, reassembly-timeout, redirect, router-advertisement, router-solicitation, source-route-failed, table-entry-error, time-exceeded, timestamp-reply, timestamp-request, ttl-exceeded, unreachable]No
packet_lengthIntegermin: 1, max: 65535No
protocolsListInteger[min: 0, max: 255]No
source_data_prefixIPNo
source_data_prefix_variableStringRegex: ^[./\[\]a-zA-Z0-9_-]{1,64}$No
source_data_prefix_listStringRegex: ^[^&<>! "]{1,128}$No
source_portsListInteger[min: 0, max: 65535]No
tcp_stateChoicesynNo

actions (sdwan.feature_profiles.service_profiles.ipv4_acls.sequences)

Section titled “actions (sdwan.feature_profiles.service_profiles.ipv4_acls.sequences)”
NameTypeConstraintMandatoryDefault Value
counter_nameStringRegex: ^[a-zA-Z0-9-_]{1,32}$No
dscpIntegermin: 0, max: 63No
ipv4_next_hopIPNo
logBooleantrue, falseNo
mirrorStringRegex: ^[^&<>! "]{1,128}$No
policerStringRegex: ^[^&<>! "]{1,128}$No

Example-1: The example below demonstrates how to configure service IPv4 access list with default action accept and two sequences. Sequence 1 matches all traffic destined to 10.0.0.0/8 with DSCP 12, accepts the traffic, sets DSCP to 0 and apply counter. Sequence 2 matches all traffic destined to 192.168.0.0/16, drops the traffic and logs the drop.

sdwan:
feature_profiles:
service_profiles:
- name: basic_service
ipv4_acls:
- name: lan_acl_in
description: "control LAN inbound traffic"
default_action: accept
sequences:
- id: 1
base_action: accept
match_entries:
destination_data_prefix: 10.0.0.0/8
dscps:
- 12
- 24
actions:
dscp: 0
counter_name: remark-dscp
- id: 2
base_action: drop
match_entries:
destination_data_prefix: 192.168.0.0/16
actions:
log: true