Step 7: Configuring Access Control Lists (Acls); How To Configure Access Control Lists (Acls) - Cisco SCE 2000 Installation And Configuration Manual

4xgbe
Hide thumbs Also See for SCE 2000:
Table of Contents

Advertisement

Initial System Configuration

Step 7: Configuring Access Control Lists (ACLs)

The SCE 2000 can be configured with Access Control Lists (ACLs), which are used to permit or deny
incoming connections on any of the management interfaces.
Note
ACL #0 is a pre-defined list that permits access to all IP addresses.
Configuration of access control lists is done in two stages.
1.
2.

How to Configure Access Control Lists (ACLs)

The SCE 2000 can be configured with Access Control Lists (ACLs), which are used to permit or deny
incoming connections on any of the management interfaces.
Note
ACL #0 is a pre-defined list that permits access to all IP addresses.
Configuration of access control lists is done in two stages.
1.
2.
Entry Formats
Each ACL may permit/deny access to any IP address, one or more ranges of IP addresses, or one or more
individual IP address. Three entry formats are available to support these options:
Cisco SCE 2000 4xGBE Installation and Configuration Guide
5-12
Chapter 5
Create the access control lists.
You may create 99 ACLs with a maximum of 20 entries per list. Each entry consists of an IP address,
and an indication of whether access is permitted or denied to this IP address.
Assign the ACLs to the appropriate management interface.
The dialog permits you to skip the creation/editing of the ACLs and go directly to assigning ACLs
to the management interfaces.
Create the access control lists.
You may create 99 ACLs with a maximum of 20 entries per list. Each entry consists of an IP address,
and an indication of whether access is permitted or denied to this IP address.
Assign the ACLs to the appropriate management interface.
The dialog permits you to skip the creation/editing of the ACLs and go directly to assigning ACLs
to the management interfaces.
Any IP address — Type the word "any". Any IP address will be permitted or denied access.
Range of IP addresses — Type the beginning IP address in the desired range, then enter the wildcard
bits that define the range.
This wildcard functions like a reverse mask, in that all "1" bits in the wildcard indicate the
corresponding bit in the IP address should be ignored. All other bits must match the corresponding
bit in the specified IP address. Refer to the table below for examples.
Each range of IP addresses can be configured to be permitted or denied access.
Connecting the Management Interfaces and Performing Initial System Configuration
OL-7824-07

Advertisement

Table of Contents
loading

Table of Contents