Mapping Security ACLs
393
To display a summary of the security ACLs mapped on a MAP (in this
example, MAP 7), type the following command:
WX#
display ap acl map 7
ACL
Type Class
Mapping
---------------------------- ---- ------ -------
acl_123
IP
Static In
acl_133
IP
Static In
acl_124
IP
Static
Clearing a Security ACL Map
To clear the mapping between a security ACL and one or more ports,
VLANs, virtual ports, or Distributed MAPS, first display the mapping with
display security acl map
and then use
clear security acl map
to
remove it. This command removes the mapping, but not the ACL.
For example, to clear the security ACL
acljoe
from a port, type the
following commands:
WX1200#
display security acl map acljoe
ACL acljoe is mapped to:
Port 4 In
WX1200#
clear security acl map acljoe port 4 in
success: change accepted.
After you clear the mapping between port 4 and ACL
acljoe
, the
following is displayed when you enter
display security acl map
:
WX1200#
display security acl map acljoe
ACL acljoe is mapped to:
Clearing a security ACL mapping does not stop the current filtering
function if the ACL has other mappings. If the security ACL is mapped to
another port, a VLAN, a virtual port, or a Distributed MAP, you must enter
a
clear security acl map
command to clear each map.
To stop the packet filtering of a user-based security ACL, you must modify
the user’s configuration in the local database on the WX switch or on the
RADIUS servers where packet filters are authorized. For information
about deleting a security ACL from a user’s configuration in the local WX
database, see “Clearing a Security ACL from a User or Group” on
page 495. To delete a security ACL from a user’s configuration on a
RADIUS server, see the documentation for your RADIUS server.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...