Step 7: Configuring Access Control Lists (Acls); Entry Formats - Cisco SCE 2000 4/8xFE Quick Start Manual

Cisco systems sce 2000 platform quick start guide
Hide thumbs Also See for SCE 2000 4/8xFE:
Table of Contents

Advertisement

Note that there is no default for this parameter.
Enter RDR-formatter destination's TCP port number:
E
:
XAMPLE
Following is a sample RDR-formatter configuration dialog, assigning the IP address and TCP port number.
Would you like to enter the RDR-formatter configuration menu? [no]: y
Enter RDR-formatter destination's IP address: 10.1.1.230
Enter RDR-formatter destination's TCP port number: 33000

Step 7: Configuring Access Control Lists (ACLs)

The SCE 2000 can be configured with Access Control Lists (ACLs), which are used to permit or deny incoming
connections on any of the management interfaces.
ACL #0 is a pre-defined list that permits access to all IP addresses.
Note
Configuration of access control lists is done in two stages:
Create the access control lists.
Step 1
You may create 99 ACLs with a maximum of 20 entries per list. Each entry consists of an IP address, and an indication of
whether access is permitted or denied to this IP address.
Step 2
Assign the ACLs to the appropriate management interface. (See
Parameters
(on page 31).)
The dialog permits you to skip the creation/editing of the ACLs and go directly to assigning ACLs to the management
interfaces.

Entry Formats

Each ACL may permit/deny access to any IP address, one or more ranges of IP addresses, or one or more individual IP
address. Three entry formats are available to support these options:
Any IP address — Type the word "any". Any IP address will be permitted or denied access.
Range of IP addresses — Type the beginning IP address in the desired range, then enter the wildcard bits that define
the range.
This wildcard functions like a reverse mask, in that all "1" bits in the wildcard indicate the corresponding bit in the IP
address should be ignored. All other bits must match the corresponding bit in the specified IP address. Refer to the
table below for examples.
Each range of IP addresses can be configured to be permitted or denied access.
Individual IP address — Type the desired IP address, then enter the wildcard bits 0.0.0.0.
Each individual IP address can be configured to be permitted or denied access.
Step 9: Configuring the Topology-Dependent
25

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sce 1000

Table of Contents