Cisco NME-16ES-1G User Guide - Page 91
Classifying Traffic by Using ACLs, no access-list, con terminal, permit, remark
UPC - 882658036101
View all Cisco NME-16ES-1G manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 91 highlights
16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series Configuration Tasks Classifying Traffic by Using ACLs You can classify IP traffic by using IP standard or IP extended ACLs. Beginning in privileged EXEC mode, follow these steps to create an IP standard ACL for IP traffic: Step 1 Step 2 Step 3 Step 4 Step 5 Command Purpose configure terminal Enters global configuration mode. access-list access-list-number {deny | permit | remark} {source source-wildcard | host source | any} Creates an IP standard ACL, repeating the command as many times as necessary. For access-list-number, enter the ACL number. The range is 1 to 99 and 1300 to 1999. Enter deny or permit to specify whether to deny or permit access if The source is the source address of the network or host from which the packet is being sent, specified in one of three ways: • The 32-bit quantity in dotted-decimal format. • The keyword any as an abbreviation for source and source-wildcard of 0.0.0.0 255.255.255.255. You do not need to enter a source-wildcard. • The keyword host as an abbreviation for source and source-wildcard of source 0.0.0.0. (Optional) The source-wildcard applies wildcard bits to the source (see first bullet item). Note Deny statements are not supported for QoS ACLS. See the "Classification Based on QoS ACLs" section on page 32 for more details. end Returns to privileged EXEC mode. show access-lists Verifies your entries. copy running-config startup-config (Optional) Saves your entries in the configuration file. To delete an ACL, use the no access-list access-list-number global configuration command. Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ 91