Cisco NME-16ES-1G User Guide - Page 84

con terminal, ip access-list standard, permit, show access-lists

Page 84 highlights

Configuration Tasks 16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Beginning in privileged EXEC mode, follow these steps to create a standard access list using names: Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command Purpose configure terminal Enters global configuration mode. ip access-list standard {name | access-list-number} Defines a standard IP access list using a name, and enter access-list configuration mode. Note The name can be a number from 1 to 99. deny {source source-wildcard | host source | any} or permit {source source-wildcard | host source | any} In access-list configuration mode, specifies one or more conditions denied or permitted to determine if the packet is forwarded or dropped. • host source represents a source and source wildcard of source 0.0.0.0. • any represents a source and source wildcard of 0.0.0.0 255.255.255.255. Note The log option is not supported on Ethernet switch interfaces. end Returns to privileged EXEC mode. show access-lists [number | name] Displays the access list configuration. copy running-config startup-config (Optional) Saves your entries in the configuration file. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Beginning in privileged EXEC mode, follow these steps to create an extended ACL using names: Command configure terminal ip access-list extended {name | access-list-number} {deny | permit} protocol {source source-wildcard | host source | any} [operator port] {destination destination-wildcard | host destination | any} [operator port] end show access-lists [number | name] copy running-config startup-config Purpose Enters global configuration mode. Defines an extended IP access list by using a name, and enter access-list configuration mode. Note The name can be a number from 100 to 199. In access-list configuration mode, specifies the conditions allowed or denied. See the "Creating a Numbered Extended ACL" section on page 80 for definitions of protocols and other keywords. • host source represents a source and source wildcard of source 0.0.0.0, and host destination represents a destination and destination wildcard of destination 0.0.0.0. • any represents a source and source wildcard or destination and destination wildcard of 0.0.0.0 255.255.255.255. Returns to privileged EXEC mode. Displays the access list configuration. (Optional) Saves your entries in the configuration file. Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ 84

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series
Configuration Tasks
84
Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ
Beginning in privileged EXEC mode, follow these steps to create a standard access list using names:
Beginning in privileged EXEC mode, follow these steps to create an extended ACL using names:
Command
Purpose
Step 1
configure terminal
Enters global configuration mode.
Step 2
ip access-list standard
{
name |
access-list-number
}
Defines a standard IP access list using a name, and enter access-list
configuration mode.
Note
The name can be a number from 1 to 99.
Step 3
deny
{
source
source-wildcard
|
host
source
|
any
}
or
permit
{
source
source-wildcard
|
host
source
|
any
}
In access-list configuration mode, specifies one or more conditions
denied or permitted to determine if the packet is forwarded or
dropped.
host
source
represents a source and source wildcard of
source
0.0.0.0.
any
represents a source and source wildcard of 0.0.0.0
255.255.255.255.
Note
The
log
option
is not supported on Ethernet switch
interfaces.
Step 4
end
Returns to privileged EXEC mode.
Step 5
show access-lists
[
number
|
name
]
Displays the access list configuration.
Step 6
copy running-config startup-config
(Optional) Saves your entries in the configuration file.
Command
Purpose
Step 1
configure terminal
Enters global configuration mode.
Step 2
ip access-list extended
{
name |
access-list-number
}
Defines an extended IP access list by using a name, and enter
access-list configuration mode.
Note
The name can be a number from 100 to 199.
Step 3
{
deny
|
permit
}
protocol
{
source
source-wildcard
|
host
source
|
any
}
[
operator
port
]
{
destination
destination-wildcard
|
host
destination
|
any
}
[
operator
port
]
In access-list configuration mode, specifies the conditions allowed
or denied.
See the
“Creating a Numbered Extended ACL” section on page 80
for definitions of protocols and other keywords.
host
source
represents a source and source wildcard of
source
0.0.0.0, and
host
destination
represents a destination and
destination wildcard of
destination
0.0.0.0.
any
represents a source and source wildcard or destination and
destination wildcard of 0.0.0.0 255.255.255.255.
Step 4
end
Returns to privileged EXEC mode.
Step 5
show access-lists
[
number
|
name
]
Displays the access list configuration.
Step 6
copy running-config startup-config
(Optional) Saves your entries in the configuration file.