Cisco Catalyst 3750 Software Configuration Manual page 456

Metro switch
Hide thumbs Also See for Catalyst 3750:
Table of Contents

Advertisement

Configuring IP ACLs
Beginning in privileged EXEC mode, follow these steps to create an extended ACL using names:
Command
Step 1
configure terminal
Step 2
ip access-list extended name
Step 3
{deny | permit} protocol {source
[source-wildcard] | host source | any}
{destination [destination-wildcard] | host
destination | any} [precedence precedence]
[tos tos] [established] [log] [time-range
time-range-name]
Step 4
end
Step 5
show access-lists [number | name]
Step 6
copy running-config startup-config
To remove a named extended ACL, use the no ip access-list extended name global configuration
command.
When you are creating standard extended ACLs, remember that, by default, the end of the ACL contains
an implicit deny statement for everything if it did not find a match before reaching the end. For standard
ACLs, if you omit the mask from an associated IP host address access list specification, 0.0.0.0 is
assumed to be the mask.
After you create an ACL, any additions are placed at the end of the list. You cannot selectively add ACL
entries to a specific ACL. However, you can use no permit and no deny access-list configuration mode
commands to remove entries from a named ACL. This example shows how you can delete individual
ACEs from the named access list border-list:
Switch(config)# ip access-list extended border-list
Switch(config-ext-nacl)# no permit ip host 10.1.1.3 any
Being able to selectively remove lines from a named ACL is one reason you might use named ACLs
instead of numbered ACLs.
After creating a named ACL, you can apply it to interfaces (see the
section on page
Catalyst 3750 Metro Switch Software Configuration Guide
25-14
Purpose
Enter global configuration mode.
Define an extended IP access list using a name and enter
access-list configuration mode.
Note
In access-list configuration mode, specify the conditions allowed
or denied. Use the log keyword to get access list logging messages,
including violations.
See the
page 25-9
host source—A source and source wildcard of source 0.0.0.0.
host destination—A destination and destination wildcard of
destination 0.0.0.0.
any—A source and source wildcard or destination and
destination wildcard of 0.0.0.0 255.255.255.255.
Return to privileged EXEC mode.
Show the access list configuration.
(Optional) Save your entries in the configuration file.
25-18) or VLANs (see the
Chapter 25
The name can be a number from 100 to 199.
"Creating a Numbered Extended ACL" section on
for definitions of protocols and other keywords.
"Applying an IP ACL to an Interface"
"Configuring VLAN Maps" section on page
Configuring Network Security with ACLs
25-27).
78-15870-01

Advertisement

Table of Contents
loading

Table of Contents