Cisco NM-8B-U User Guide - Page 80
Creating a Numbered Standard ACL, Creating a Numbered Extended ACL
UPC - 074632001001
View all Cisco NM-8B-U manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 80 highlights
Configuration Tasks 16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Creating a Numbered Standard ACL Beginning in privileged EXEC mode, follow these steps to create a numbered standard ACL: Step 1 Step 2 Step 3 Step 4 Step 5 Command Purpose configure terminal Enters global configuration mode. access-list access-list-number {deny | permit | Defines a standard IP ACL by using a source address and wildcard. remark} {source source-wildcard | host source The access-list-number is a decimal number from 1 to 99 or 1300 | any} to 1999. Enter deny or permit to specify whether to deny or permit access if conditions are matched. The source is the source address of the network or host from which the packet is being sent: • The 32-bit quantity in dotted-decimal format. • The keyword any as an abbreviation for source and source-wildcard of 0.0.0.0 255.255.255.255. You do not need to enter a source-wildcard. • The keyword host as an abbreviation for source and source-wildcard of source 0.0.0.0. (Optional) The source-wildcard applies wildcard bits to the source. (See first bullet item.) Note The log option is not supported on Ethernet switch network modules. end Returns to privileged EXEC mode. show access-lists [number | name] Displays the access list configuration. copy running-config startup-config (Optional) Saves your entries in the configuration file. Use the no access-list access-list-number global configuration command to delete the entire ACL. You cannot delete individual ACEs from numbered access lists. Note When creating an ACL, remember that, by default, the end of the ACL contains an implicit deny statement for all packets that it did not find a match for before reaching the end. With standard access lists, if you omit the ask from an associated IP host address ACL specification, 0.0.0.0 is assumed to be the mask. Creating a Numbered Extended ACL Although standard ACLs use only source addresses for matching, you can use an extended ACL source and destination addresses for matching operations and optional protocol type information for finer granularity of control. Some protocols also have specific parameters and keywords that apply to that protocol. These IP protocols are supported (protocol keywords are in parentheses in bold): Internet Protocol (ip), Transmission Control Protocol (tcp), or User Datagram Protocol (udp). Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ 80