Cisco NME-X-23ES-1G User Guide - Page 171

Defaults, Command Modes, Command History, Usage Guidelines, Examples, Release, Modification

Page 171 highlights

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series deny (access-list configuration) operator port (Optional) Source or destination port. The operator can be only eq (equal). If operator is after the source IP address and wildcard, conditions match when the source port matches the defined port. If operator is after the destination IP address and wildcard, conditions match when the destination port matches the defined port. The port is a decimal number or name of a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port. The number can be from 0 to 65535. Use TCP port names only for TCP traffic. Use UDP port names only for UDP traffic. Defaults There are no specific conditions that deny packets in the named or numbered IP ACL. The default ACL is always terminated by an implicit deny statement for all packets. Command Modes Access-list configuration Command History Release 12.1(6)EA2 12.2(15)ZJ Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. Usage Guidelines Use this command after the ip access-list global configuration command to specify deny conditions for an IP ACL. You can specify a source IP address, destination IP address, IP protocol, TCP port, or UDP port. Specify the TCP and UDP port numbers only if protocol is tcp or udp and operator is eq. Note For more information about configuring IP ACLs, refer to the "Configuring IP Services" chapter in the Cisco IOS IP Configuration Guide, Release 12.2. Examples The following example shows how to create an extended IP ACL and to configure deny conditions for it: Switch(config)# ip access-list extended Internetfilter Switch(config-ext-nacl)# deny tcp host 190.5.88.10 any Switch(config-ext-nacl)# deny tcp host 192.1.10.10 any The following is an example of a standard ACL that sets a deny conditions: ip access-list standard Acclist1 deny 192.5.34.0 0.0.0.255 deny 128.88.10.0 0.0.0.255 deny 36.1.1.0 0.0.0.255 Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ 171

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series
deny (access-list configuration)
171
Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ
Defaults
There are no specific conditions that deny packets in the named or numbered IP ACL.
The default ACL is always terminated by an implicit deny statement for all packets.
Command Modes
Access-list configuration
Command History
Usage Guidelines
Use this command after the
ip access-list
global configuration command to specify deny conditions for
an IP ACL. You can specify a source IP address, destination IP address, IP protocol, TCP port, or UDP
port. Specify the TCP and UDP port numbers only if
protocol
is
tcp
or
udp
and
operator
is
eq
.
Note
For more information about configuring IP ACLs, refer to the “Configuring IP Services” chapter in
the
Cisco IOS IP Configuration Guide
, Release 12.2.
Examples
The following example shows how to create an extended IP ACL and to configure deny conditions for it:
Switch(config)#
ip access-list extended Internetfilter
Switch(config-ext-nacl)#
deny tcp host 190.5.88.10 any
Switch(config-ext-nacl)#
deny tcp host 192.1.10.10 any
The following is an example of a standard ACL that sets a deny conditions:
ip access-list standard Acclist1
deny 192.5.34.0
0.0.0.255
deny 128.88.10.0
0.0.0.255
deny 36.1.1.0
0.0.0.255
operator port
(Optional) Source or destination port.
The
operator
can be only
eq
(equal).
If
operator
is after the source IP address and wildcard, conditions match
when the source port matches the defined port.
If
operator
is after the destination IP address and wildcard, conditions
match when the destination port matches the defined port.
The
port
is a decimal number or name of a Transmission Control Protocol
(TCP) or User Datagram Protocol (UDP) port. The number can be from
0 to 65535.
Use TCP port names only for TCP traffic.
Use UDP port names only for UDP traffic.
Release
Modification
12.1(6)EA2
This command was introduced.
12.2(15)ZJ
This command was implemented on the following platforms: Cisco 2600
series, Cisco 3600 series, and Cisco 3700 series routers.