To configure a filter for an extended IP ACL without a specified sequence number, use any or all of the
following commands in IP ACCESS LIST mode:
Command Syntax
{deny | permit} {source mask | any | host
ip-address} [count [byte]] [order] [fragments]
{deny | permit} tcp {source mask] | any | host
ip-address}} [count [byte]] [order] [fragments]
{deny | permit} udp {source mask | any | host
ip-address}} [count [byte]] [order] [fragments]
Figure 5-11
The filters were assigned sequence numbers based on the order in which they were configured (for
example, the first filter was given the lowest sequence number). The
LIST mode displays the two filters with the sequence numbers 5 and 10.
Figure 5-11. Extended IP ACL
FTOS(conf-ext-nacl)#deny tcp host 123.55.34.0 any
FTOS(conf-ext-nacl)#permit udp 154.44.123.34 0.0.255.255 host 34.6.0.0
FTOS(conf-ext-nacl)#show config
!
ip access-list extended nimule
seq 5 deny tcp host 123.55.34.0 any
seq 10 permit udp 154.44.0.0 0.0.255.255 host 34.6.0.0
FTOS(conf-ext-nacl)#
To view all configured IP ACLs and the number of packets processed through the ACL, use the
accounting access-list
Established Flag
To obtain the functionality of
•
permit tcp any any rst
•
permit tcp any any ack
80
|
Access Control Lists (ACLs)
shows an extended IP ACL in which the sequence numbers were assigned by the software.
command in EXEC Privilege mode
,
use the following ACLs:
est
Command Mode
CONFIG-EXT-NACL
CONFIG-EXT-NACL
CONFIG-EXT-NACL
(Figure
5-6).
Purpose
Configure a deny or permit filter to
examine IP packets.
Configure a deny or permit filter to
examine TCP packets.
Configure a deny or permit filter to
examine UDP packets.
command in IP ACCESS
show config
show ip