Cisco Catalyst 3560-X Software Configuration Manual page 885

Hide thumbs Also See for Catalyst 3560-X:
Table of Contents

Advertisement

Chapter 1
Configuring Network Security with ACLs
Beginning in privileged EXEC mode, follow these steps to create a standard ACL using names:
Command
Step 1
configure terminal
Step 2
ip access-list standard name
Step 3
deny {source [source-wildcard] | host source |
any} [log | smartlog]
or
permit {source [source-wildcard] | host source
| any} [log] | smartlog]
Step 4
end
Step 5
show access-lists [number | name]
Step 6
copy running-config startup-config
To remove a named standard ACL, use the no ip access-list standard name global configuration
command.
Beginning in privileged EXEC mode, follow these steps to create an extended ACL using names:
Command
Step 1
configure terminal
Step 2
ip access-list extended name
Step 3
{deny | permit} protocol {source
[source-wildcard] | host source | any}
{destination [destination-wildcard] | host
destination | any} [precedence precedence]
[tos tos] [established] [log | smartlog]
[time-range time-range-name]
Step 4
end
Step 5
show access-lists [number | name]
Step 6
copy running-config startup-config
To remove a named extended ACL, use the no ip access-list extended name global configuration
command.
OL-25303-03
Purpose
Enter global configuration mode.
Define a standard IPv4 access list using a name, and enter
access-list configuration mode.
The name can be a number from 1 to 99.
In access-list configuration mode, specify one or more conditions
denied or permitted to decide if the packet is forwarded or dropped.
host source—A source and source wildcard of source 0.0.0.0.
any—A source and source wildcard of 0.0.0.0
255.255.255.255.
Return to privileged EXEC mode.
Show the access list configuration.
(Optional) Save your entries in the configuration file.
Purpose
Enter global configuration mode.
Define an extended IPv4 access list using a name, and enter
access-list configuration mode.
The name can be a number from 100 to 199.
In access-list configuration mode, specify the conditions allowed
or denied. Use the log keyword to get access list logging messages,
including violations.
See the
"Creating a Numbered Extended ACL" section on
page 1-11
for definitions of protocols and other keywords.
host source—A source and source wildcard of source 0.0.0.0.
host destination—A destination and destination wildcard of
destination 0.0.0.0.
any—A source and source wildcard or destination and
destination wildcard of 0.0.0.0 255.255.255.255.
Return to privileged EXEC mode.
Show the access list configuration.
(Optional) Save your entries in the configuration file.
Catalyst 3750-X and 3560-X Switch Software Configuration Guide
Configuring IPv4 ACLs
1-17

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3750-x

Table of Contents