Configuring Access Lists
Defaults
If reinitialize is not specified, the user must supply SSH authentication key values.
Mode
Switch command, read‐write.
Example
This example shows how to regenerate SSH keys:
C2(su)->set ssh hostkey reinitialize
Configuring Access Lists
Purpose
To review and configure security access control lists (ACLs), which permit or deny access to
routing interfaces based on protocol and IP address restrictions.
Commands
For information about...
show access-lists
access-list (standard)
access-list (extended)
ip access-group
show access-lists
Use this command to display configured IP access lists when operating in router mode.
Syntax
show access‐lists [number]
Parameters
access‐list‐
number
18-70 Security Configuration
Router: These commands can be executed when the device is in router mode only. For details
on how to enable router configuration modes, refer to
page 15-2.
Note: Access Control Lists are limited to 100 per stack and 9 per interface on C2 stack
configurations, or mixed configurations of C2 and C3 switches in a stack. On C3-only
configurations, up to 100 Access Control Lists with up to 20 access rules per list and 60 per
interface are supported per stack .
(Optional) Displays access list information for a specific access list number.
Valid values are between 1 and 199.
"Enabling Router Configuration
Refer to page...
18-70
18-74
18-73
18-74
Modes" on