Ip Access-Group - Cisco Catalyst 3550 Command Reference Manual

Multilayer switch
Hide thumbs Also See for Catalyst 3550:
Table of Contents

Advertisement

ip access-group

ip access-group
Use the ip access-group interface configuration command to control access to a Layer 2 or Layer 3
interface. Use the no form of this command to remove all access groups or the specified access group
from the interface.
Syntax Description
access-list-number
name
in
out
Defaults
No access list is applied to the interface.
Command Modes
Interface configuration
Command History
Release
12.1(4)EA1
Usage Guidelines
You can apply named or numbered standard or extended access lists to an interface. To define an access
list by name, use the ip access-list global configuration command. To define a numbered access list, use
the access list global configuration command. You can used numbered standard access lists ranging from
1 to 99 and 1300 to 1999 or extended access lists ranging from 100 to 199 and 2000 to 2699.
You can use this command to apply an access list to a Layer 2 or Layer 3 interface. However, note these
limitations for Layer 2 interfaces (port ACLs):
You can apply IP ACLs to both outbound or inbound Layer 3 interfaces.
A Layer 2 interface can have only one IP ACL applied (in the inbound direction). A Layer 3 interface
can have one IP ACL applied in each direction.
Catalyst 3550 Multilayer Switch Command Reference
2-98
ip access-group {access-list-number | name} {in | out}
no ip access-group [access-list-number | name] {in | out}
The number of the IP access control list (ACL), from 1 to 199 or from 1300
to 2699.
The name of an IP ACL, specified in the ip access-list global configuration
command.
Specify filtering on inbound packets.
Specify filtering on outbound packets. This keyword is valid only on
Layer 3 interfaces.
Modification
This command was first introduced.
You can only apply ACLs in the inbound direction; the out keyword is not supported for Layer 2
interfaces.
You can only apply one IP ACL and one MAC ACL per interface.
Layer 2 interfaces do not support logging; if the log keyword is specified in the IP ACL, it is ignored.
An IP ACL applied to a Layer 2 interface only filters IP packets. To filter non-IP packets, use the
mac access-group interface configuration command with MAC extended ACLs.
Chapter 2
Cisco IOS Commands
78-11195-09

Advertisement

Table of Contents
loading

Table of Contents