ip access-list < type > "< id-string >"< permit | deny > ip
< source-ip-address > < source-acl-mask >
< destination-ip-address > < destination-acl-mask > [log]
< permit | deny > tcp
< source-ip-address > < source-acl-mask > [< operator > < port-id >]
< destination-ip-address > < destination-acl-mask > [< operator > < port-id >]
< permit | deny > udp
< source-ip-address > < source-acl-mask > [< operator > < port-id >]
< destination-ip-address > < destination-acl-mask > [< operator > < port-id >] [log]
. . .
exit
Figure 9-10. General Structure for an Extended ACL
Protocol Types
End-of-List
Marker
ACE Action
(permit or deny)
Figure 9-11. Example of a Displayed Extended ACL Configuration
For example, figure 9-11 shows how to interpret the entries in an extended
ACL.
Source IP Addresses and
Masks.
Upper entry denies certain
UDP packets from a single
host. Lower entry denies all
UDP packets from all hosts.
ACL List Heading with
List Type and ID String
(Name or Number)
Optional Source UDP or
TCP Operator and Port
Address and Mask
Number
In this case, the ACL
specifies UDP port 69
packets coming from the
source IP address.
Access Control Lists (ACLs)
Configuring and Assigning an ACL
Note: The optional log
function appears only
with "deny" aces.
[log]
Specifies all destination
IP addresses.
Denies TCP
traffic to any
destination
Optional Destination
Destination IP
UDP or TCP Operator
and Port Numbers
In this case, the ACL
specifies UDP port
number 3690.
Port 80
from any
source.
9-35
Need help?
Do you have a question about the 2610 and is the answer not in the manual?
Questions and answers