You may be more familiar with using access profiles on other Extreme Networks switches. This example shows the policy equivalent to an ExtremeWare access profile.
ExtremeWare Access-Profile:
Seq_No Action IP Address IP Mask Exact 5 permit 22.16.0.0 255.252.0.0 No 10 permit 192.168.0.0 255.255.192.0 Yes 15 deny any 255.0.0.0 No 20 permit 10.10.0.0 255.255.192.0 No 25 deny 22.44.66.0 255.255.254.0 Yes
Equivalent ExtremeXOS policy map definition:
entry entry-5 { If { nlri 22.16.0.0/14; } then { permit; } } entry entry-10 { if { nlri 192.168.0.0/18 exact; } then { permit; } } entry entry-15 { if { nlri any/8; } then { deny; } } entry entry-20 { if { nlri 10.10.0.0/18; } Then { permit; } } entry entry-25 { if { nlri 22.44.66.0/23 exact; } then { deny; } }
The policy above can be optimized by combining some of the if statements into a single expression.
The compact form of the policy looks like this:
entry permit_entry { If match any { nlri 22.16.0.0/14; nlri 192.168.0.0/18 exact ; nlri 10.10.0.0/18; } then { permit; } } entry deny_entry { if match any { nlri any/8; nlri 22.44.66.0/23 exact; } then { deny; } }