Cisco NME-16ES-1G User Guide - Page 185

ip access-list

Page 185 highlights

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series ip access-list ip access-list To create an IP access control list (ACL) to be used for matching packets to an ACL whose name or number you specify and to enter access-list configuration mode, use the ip access-list command in global configuration mode. To delete an existing IP ACL and return to global configuration mode, use the no form of this command. ip access-list {standard | extended} {name | access-list-number} no ip access-list {standard | extended} {name | access-list-number} Syntax Description name access-list-number Name of an ACL. Note The ACL name must begin with an alphabetic character to prevent ambiguity with numbered ACLs. A name also cannot contain a space or quotation mark. Number of an ACL. For standard IP ACLs, the range is from 1 to 99 and from 1300 to 1999. For extended IP ACLs, the range from 100 to 199 and from 2000 to 2699. Defaults No named or numbered IP ACLs are defined. Command Modes Global configuration Command History Release 12.1(6)EA2 12.2(15)ZJ Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. Usage Guidelines Use this command to specify the name or number of the IP ACL for which you want to create or modify ACL match criteria and to enter access-list configuration mode. In this mode, you must enter the permit and deny commands to configure the permit and deny access conditions for this list. The ip access-list command and its subcommands are used to define packet classification and marking as part of a globally-named service policy applied on a per-interface basis or as an IP access group applied on a per-interface basis. Specifying standard or extended with the ip access-list command determines the prompt you get when you enter access-list configuration mode. Note For more information about configuring IP ACLs, refer to the "Configuring IP Services" chapter in the Cisco IOS IP Configuration Guide, Release 12.2. Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ 185

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series
ip access-list
185
Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ
ip access-list
To create an IP access control list (ACL) to be used for matching packets to an ACL whose name or
number you specify and to enter access-list configuration mode, use the
ip access-list
command in
global configuration mode. To delete an existing IP ACL and return to global configuration mode, use
the
no
form of this command.
ip access-list
{
standard
|
extended
} {
name | access-list-number
}
no ip access-list
{
standard
|
extended
}
{
name | access-list-number
}
Syntax Description
Defaults
No named or numbered IP ACLs are defined.
Command Modes
Global configuration
Command History
Usage Guidelines
Use this command to specify the name or number of the IP ACL for which you want to create or modify
ACL match criteria and to enter access-list configuration mode. In this mode, you must enter the
permit
and
deny
commands to configure the permit and deny access conditions for this list.
The
ip access-list
command and its subcommands are used to define packet classification and marking
as part of a globally-named service policy applied on a per-interface basis or as an IP access group
applied on a per-interface basis.
Specifying
standard
or
extended
with the
ip access-list
command determines the prompt you get when
you enter access-list configuration mode.
Note
For more information about configuring IP ACLs, refer to the “Configuring IP Services” chapter in
the
Cisco IOS IP Configuration Guide
, Release 12.2.
name
Name of an ACL.
Note
The ACL name must begin with an alphabetic character to prevent
ambiguity with numbered ACLs. A name also cannot contain a space or
quotation mark.
access-list-number
Number of an ACL.
For standard IP ACLs, the range is from 1 to 99 and from 1300 to 1999.
For extended IP ACLs, the range from 100 to 199 and from 2000 to 2699.
Release
Modification
12.1(6)EA2
This command was introduced.
12.2(15)ZJ
This command was implemented on the following platforms: Cisco 2600
series, Cisco 3600 series, and Cisco 3700 series routers.