24-3
Catalyst 2360 Switch Software Configuration Guide
OL-19808-01
Chapter 24 Managing Network Security with ACLs
Configuring IPv4 ACLs
Configuring IPv4 ACLs
Configuring IP v4ACLs on the switch is the same as configuring IPv4 ACLs on other Cisco switches
and routers. The process is briefly described here. For more detailed information on configuring ACLs,
see the “Configuring IP Services” section in the “IP Addressing and Services” chapter of the
Cisco IOS
IP Configuration Guide, Release 12.2.
For detailed information about the commands, see the
Cisco IOS
IP Command Reference, Volume 1 of 3: Addressing and Services, Release 12.2.
The switch does not support these Cisco IOS router ACL-related features:
•
Non-IP protocol ACLs (see
) or bridge-group ACLs
•
IP accounting
•
Inbound and outbound rate limiting (except with QoS ACLs)
•
Reflexive ACLs or dynamic ACLs (except for some specialized dynamic ACLs used by the switch
clustering feature)
•
ACL logging
These are the steps to use IP ACLs on the switch:
Step 1
Create an ACL by specifying an access list number or name and the access conditions.
Step 2
Apply the ACL to the management VLAN. You can also apply standard and extended IP ACLs to VLAN
maps.
These sections contain this configuration information:
•
Creating Standard and Extended IPv4 ACLs, page 24-3
•
Applying an IPv4 ACL to a Terminal Line, page 24-12
•
Applying an IPv4 ACL to a Management VLAN, page 24-13
•
IPv4 ACL Configuration Examples, page 24-14
Creating Standard and Extended IPv4 ACLs
This section describes IP ACLs. An ACL is a sequential collection of permit and deny conditions. One
by one, the switch tests packets against the conditions in an access list. The first match determines
whether the switch accepts or rejects the packet. Because the switch stops testing after the first match,
the order of the conditions is critical. If no conditions match, the switch denies the packet.
The software supports these types of ACLs or access lists for IPv4:
•
Standard IP access lists use source addresses for matching operations.
•
Extended IP access lists use source and destination addresses for matching operations and optional
protocol-type information for finer granularity of control.
These sections describe access lists and how to create them:
•
Access List Numbers, page 24-4
•
Creating a Numbered Standard ACL, page 24-5
•
Creating a Numbered Extended ACL, page 24-6
•