Cisco NME-X-23ES-1G User Guide - Page 183

ip access-group

Page 183 highlights

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series ip access-group ip access-group To control access to an interface, use the ip access-group command in interface configuration mode. To remove an access group from an interface, use the no form of this command. ip access-group {access-list-number | name} in no ip access-group {access-list-number | name} in Syntax Description access-list-number name in Number of the IP access control list (ACL), from 1 to 199 or from 1300 to 2699. Name of an IP ACL, specified in the ip access-list command. Applies the IP ACL to packets entering the interface. Defaults No ACL is applied to the interface. Command Modes Interface configuration Command History Release 12.1(6)EA2 12.2(15)ZJ Modification This command was introduced. This command was implemented on the following platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700 series routers. Usage Guidelines You can apply IP ACLs only to ingress interfaces. The ACLs can be standard or extended. For standard ACLs, after receiving a packet, the switch checks the packet source address. If the source address matches a defined address in the ACL and the list permits the address, the switch forwards the packet. For extended ACLs, after receiving the packet, the switch checks the match conditions in the ACL. If the conditions are matched, the switch forwards the packet. If the specified ACL does not exist, the switch forwards all packets. IP access groups can be separated on Layer 2 and Layer 3 interfaces. Note For more information about configuring IP ACLs, refer to the "Configuring IP Services" chapter in the Cisco IOS IP Configuration Guide, Release 12.2. Examples The following example shows how to apply a numbered ACL to an interface: Switch(config)# interface fastethernet0/1 Switch(config-if)# ip access-group 101 in Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ 183

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246

16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series
ip access-group
183
Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ
ip access-group
To control access to an interface, use the
ip access-group
command in interface configuration mode. To
remove an access group from an interface, use the
no
form of this command.
ip access-group
{
access-list-number | name
}
in
no ip access-group
{
access-list-number | name
}
in
Syntax Description
Defaults
No ACL is applied to the interface.
Command Modes
Interface configuration
Command History
Usage Guidelines
You can apply IP ACLs only to ingress interfaces.
The ACLs can be standard or extended.
For standard ACLs, after receiving a packet, the switch checks the packet source address. If the source
address matches a defined address in the ACL and the list permits the address, the switch forwards the
packet.
For extended ACLs, after receiving the packet, the switch checks the match conditions in the ACL. If the
conditions are matched, the switch forwards the packet.
If the specified ACL does not exist, the switch forwards all packets.
IP access groups can be separated on Layer 2 and Layer 3 interfaces.
Note
For more information about configuring IP ACLs, refer to the “Configuring IP Services” chapter in
the
Cisco IOS IP Configuration Guide
, Release 12.2.
Examples
The following example shows how to apply a numbered ACL to an interface:
Switch(config)#
interface fastethernet0/1
Switch(config-if)#
ip access-group 101 in
access-list-number
Number of the IP access control list (ACL), from 1 to 199 or from 1300 to 2699.
name
Name of an IP ACL, specified in the
ip access-list
command.
in
Applies the IP ACL to packets entering the interface.
Release
Modification
12.1(6)EA2
This command was introduced.
12.2(15)ZJ
This command was implemented on the following platforms: Cisco 2600
series, Cisco 3600 series, and Cisco 3700 series routers.