Cisco NME-16ES-1G User Guide - Page 82

Command, Purpose, con terminal, access-list, permit, remark, show access-lists

Page 82 highlights

Configuration Tasks 16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Beginning in privileged EXEC mode, follow these steps to create an extended ACL: Step 1 Step 2 Command Purpose configure terminal Enters global configuration mode. access-list access-list-number {deny | permit | remark} protocol {source source-wildcard | host source | any} [operator port] {destination destination-wildcard | host destination | any} [operator port] Defines an extended IP access list and the access conditions. The access-list-number is a decimal number from 100 to 199 or 2000 to 2699. Enter deny or permit to specify whether to deny or permit the packet if conditions are matched. For protocol, enter the name or number of an IP protocol: ip, tcp, or udp. To match any Internet protocol (including TCP and UDP), use the keyword ip. Note This step includes options for most IP protocols. Step 3 Step 4 show access-lists [number | name] copy running-config startup-config The source is the number of the network or host from which the packet is sent. The source-wildcard applies wildcard bits to the source. The destination is the network or host number to which the packet is sent. Defines a destination or source port. • The operator can be only eq (equal). • If operator is after source source-wildcard, conditions match when the source port matches the defined port. • If operator is after destination destination-wildcard, conditions match when the destination port matches the defined port. • The port is a decimal number or name of a TCP or UDP port. The number can be from 0 to 65535. • Use TCP port names only for TCP traffic. • Use UDP port names only for UDP traffic. The destination-wildcard applies wildcard bits to the destination. Source, source-wildcard, destination, and destination-wildcard can be specified in three ways: • The 32-bit quantity in dotted-decimal format. • The keyword any as an abbreviation for source and source-wildcard of 0.0.0.0 255.255.255.255 or any source host. • The keyword host, followed by the 32-bit quantity in dotted-decimal format, as an abbreviation for a single host with source and source-wildcard of source 0.0.0.0. Note Only the ip, tcp, and udp protocols are supported on Ethernet switch interfaces. Verifies the access list configuration. (Optional) Saves your entries in the configuration file. Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ 82

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series
Configuration Tasks
82
Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ
Beginning in privileged EXEC mode, follow these steps to create an extended ACL:
Command
Purpose
Step 1
configure terminal
Enters global configuration mode.
Step 2
access-list
access-list-number
{
deny
|
permit
|
remark
}
protocol
{
source
source-wildcard
|
host
source
|
any
}
[
operator
port
]
{
destination destination-wildcard
|
host
destination
|
any
} [
operator
port
]
Defines an extended IP access list and the access conditions.
The
access-list-number
is a decimal number from 100 to 199 or 2000 to 2699.
Enter
deny
or
permit
to specify whether to deny or permit the packet if
conditions are matched.
For
protocol
, enter the name or number of an IP protocol:
ip
,
tcp
, or
udp
. To
match any Internet protocol (including TCP and UDP), use the keyword
ip
.
Note
This step includes options for most IP protocols.
The
source
is the number of the network or host from which the packet is sent.
The
source-wildcard
applies wildcard bits to the source.
The
destination
is the network or host number to which the packet is sent.
Defines a destination or source port.
The
operator
can be only
eq
(equal).
If operator is after
source source-wildcard
, conditions match when the
source port matches the defined port.
If operator is after
destination destination-wildcard
, conditions match
when the destination port matches the defined port.
The
port
is a decimal number or name of a TCP or UDP port. The number
can be from 0 to 65535.
Use TCP port names only for TCP traffic.
Use UDP port names only for UDP traffic.
The
destination-wildcard
applies wildcard bits to the destination.
Source
,
source-wildcard
,
destination
, and
destination-wildcard
can be
specified in three ways:
The 32-bit quantity in dotted-decimal format.
The keyword
any
as an abbreviation for
source
and
source-wildcard
of 0.0.0.0 255.255.255.255 or any source host.
The keyword
host,
followed by the 32-bit quantity in dotted-decimal
format, as an abbreviation for a single host with source and
source-wildcard of
source
0.0.0.0.
Note
Only the
ip
,
tcp
, and
udp
protocols are supported on Ethernet switch
interfaces.
Step 3
show access-lists
[
number
|
name
]
Verifies the access list configuration.
Step 4
copy running-config
startup-config
(Optional) Saves your entries in the configuration file.