Ip Access-Group - Cisco Catalyst 3030 Command Reference Manual

Blade switch
Hide thumbs Also See for Catalyst 3030:
Table of Contents

Advertisement

ip access-group

ip access-group
Use the ip access-group interface configuration command to control access to a Layer 2 interface. Use
the no form of this command to remove all access groups or the specified access group from the
interface.
Syntax Description
access-list-number
name
in
Defaults
No access list is applied to the interface.
Command Modes
Interface configuration
Command History
Release
12.2(25)SEE
Usage Guidelines
You can apply named or numbered standard or extended IP access lists to an interface. To define an
access list by name, use the ip access-list global configuration command. To define a numbered access
list, use the access list global configuration command. You can used numbered standard access lists
ranging from 1 to 99 and 1300 to 1999 or extended access lists ranging from 100 to 199 and 2000 to
2699.
You can use this command to apply an access list to a Layer 2 interface. However, note these limitations
for port ACLs:
You can use input port ACLs and VLAN maps on the same switch. However, a port ACL takes
precedence over a VLAN map. When both an input port ACL and a VLAN map are applied, incoming
packets received on ports with the port ACL applied are filtered by the port ACL. Other packets are
filtered by the VLAN map.
Cisco Catalyst Blade Switch 3030 Command Reference
2-100
ip access-group {access-list-number | name} {in}
no ip access-group [access-list-number | name] {in}
The number of the IP access control list (ACL). The range is 1 to 199 or
1300 to 2699.
The name of an IP ACL, specified in the ip access-list global configuration
command.
Specify filtering on inbound packets.
Modification
This command was introduced.
You can only apply ACLs in the inbound direction.
You can only apply one IP ACL and one MAC ACL per interface.
do not support logging; if the log keyword is specified in the IP ACL, it is ignored.
An IP ACL applied to a interface only filters IP packets. To filter non-IP packets, use the mac
access-group interface configuration command with MAC extended ACLs.
Chapter 2
Cisco Catalyst Blade Switch 3030 Cisco IOS Commands
78-17262-01

Advertisement

Table of Contents
loading

Table of Contents