Dell Force10 S25N-S50N FTOS Command Line Reference Guide FTOS 8.4.2.7 E-Series - Page 207
Common IP ACL Commands
View all Dell Force10 S25N-S50N manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 207 highlights
Example The following example shows the use of the remark command twice within the CONFIGURATION-STANDARD-ACCESS-LIST mode. Here, the same sequence number was used for the remark and for an associated ACL rule. The remark will precede the rule in the running-config because it is assumed that the remark is for the rule with the same sequence number, or the group of rules that follow the remark. Figure 9-1. Command Example: remark FTOS(config-std-nacl)#remark 10 Deny rest of the traffic FTOS(config-std-nacl)#remark 5 Permit traffic from XYZ Inc. FTOS(config-std-nacl)#show config ! ip access-list standard test remark 5 Permit traffic from XYZ Inc. seq 5 permit 1.1.1.0/24 remark 10 Deny rest of the traffic seq 10 Deny any FTOS(config-std-nacl)# Related Commands show config Display the current ACL configuration. show config c e s Display the current ACL configuration. Syntax show config Command Modes CONFIGURATION-STANDARD-ACCESS-LIST CONFIGURATION-EXTENDED-ACCESS-LIST CONFIGURATION-MAC ACCESS LIST-STANDARD CONFIGURATION-MAC ACCESS LIST-EXTENDED Command History Version 8.1.1.0 Version 7.6.1.0 Version 7.5.1.0 Version 6.2.1.1 Introduced on E-Series ExaScale Support added for S-Series Support added for C-Series Introduced Example Figure 9-2. Command Example: show config FTOS(config-ext-nacl)#show conf ! ip access-list extended patches FTOS(config-ext-nacl)# Common IP ACL Commands The following commands are available within both IP ACL modes (Standard and Extended) and do not have mode-specific options. When an access-list (ACL) is created without any rule and then applied to an interface, ACL behavior reflects an implicit permit. Access Control Lists (ACL) | 207