Configures an access list based firewall with this user role
A firewall is a mechanism enforcing access control, and is considered a first line of defense in protecting proprietary information within the network. The means by which this is accomplished varies, but in principle, firewalls are mechanisms both blocking and permitting data traffic based on inbound and outbound IP and MAC rules.
IP based firewall rules are specific to source and destination IP addresses and the unique rules and precedence orders assigned. Both IP and non-IP traffic on the same layer 2 interface can be filtered by applying both an IP ACL and a MAC.
A MAC firewall rule uses source and destination MAC addresses for matching operations, where the result is a typical allow, deny or mark designation to packet traffic.
use [application-policy|bonjour-gw-discovery-policy|ip-access-list|ipv6-access-list|
mac-access-list|purview-application-policy|url-filter]
use [application-policy|bonjour-gw-discovery-policy|purview-application-policy]
use [ip-access-list|ipv6-access-list] [in|out] <IP/ipv6-ACCESS-LIST-NAME> precedence <1-100>
use mac-access-list [in|out] <MAC-ACCESS-LIST-NAME> precedence <1-100>
use url-filter <URL-FILTER-NAME>
use [application-policy|bonjour-gw-discovery-policy|purview-application-policy]
application-policy <POLICY-NAME> | Uses an existing Application policy with a user
role. When associated, the Application policy enforces
application assurance for all users using this role.
Note: For
more information on Application policy, see application-policy.
|
bonjour-gw-discovery-policy <POLICY-NAME> |
Uses an existing Bonjour GW Discovery policy with a
user role. When associated, the Bonjour GW Discovery
policy is applied for the Bonjour requests coming from
this specific user roles.
Note: Ror
more information on Bonjour GW Discovery policy, see
bonjour-gw-discovery-policy.
|
purview-application-policy <PURVIEW-APP-POLICY-NAME> | Uses an existing Purview application policy with this user
role. When associated, the application policy enforces application assurance
for all users using this role.
Note: For more information on Purvoew application policy, see purview-application-policy.
|
use [ip-access-list|ipv6-access-list] [in|out] <IP/ipv6-ACCESS-LIST-NAME> precedence <1-100>
ip-access-list [in|out] |
Uses an IPv4 or IPv6 ACL with this user role
|
<IPv4/IPv6-ACCESS-LIST-NAME> | Specify the IPv4/IPv6 access list name. |
precedence <1-100> |
After specifying the name of the access list, specify the precedence applied to it. Based on the packets received, a lower precedence value is evaluated first.
|
use mac-access-list [in|out] <MAC-ACCESS-LIST-NAME> precedence <1-100>
mac-access-list [in|out] |
Uses a MAC access list with this user role
|
<MAC-ACCESS-LIST- NAME> |
Specify the MAC access list name. |
precedence <1-100> |
After specifying the name of the access list, specify the precedence applied to it. Based on the packets received, a lower precedence value is evaluated first.
|
use url-filter <URL-FILTER-NAME>
use url-filter <URL-FILTER-NAME> | Uses an existing URL filter that acts as a Web content filter firewall
rule.
|
nx9500-6C8809(config-role-policy-test-user-role-testing)#use ip-access-list in
test precedence 9
nx9500-6C8809(config-role-policy-test-user-role-testing)#show context user-role testing precedence 10 ssid not-contains DevUser captive-portal authentication-state pre-login city exact SanJose company exact ExampleCompany country exact America department exact TnV emailid exact testing@examplecompany.com state exact active use ip-access-list in test precedence 9 nx9500-6C8809(config-role-policy-test-user-role-testing)#
nx9500-6C8809(config-role-policy-bonjour_test-user-role-bonjour_user1)#use bonjour-gw-discovery-policy role2
nx9500-6C8809(config-role-policy-bonjour_test-user-role-bonjour_user1)#show context user-role bonjour_user1 precedence 2 use bonjour-gw-discovery-policy role2 nx9500-6C8809(config-role-policy-bonjour_test-user-role-bonjour_user1)#
nx9500-6C8809(config-role-policy-bonjour_test)#show context role-policy bonjour_test user-role bonjour_user precedence 1 mu-mac A4-D1-D2-BF-3D-19 use bonjour-gw-discovery-policy role1 user-role bonjour_user1 precedence 2 mu-mac B0-65-BD-4B-BC-09 use bonjour-gw-discovery-policy role2 ................................................ nx9500-6C8809(config-role-policy-bonjour_test)#
no | Removes an IP, MAC access list, or a Bonjour GW Discovery policy from use with a user role |