Purpose
Command or Action
Creates an access list specifying that permits access to the
specific multicast address that matches the specified
group-ip-address
and
mask
.
access-list access-list permit
group-ip-address
[
mask
]
Example:
Router(config)#
access-list 90
permit 228.1.1.1
Step 2
Configures the access list that denies access to any multicast
address that matches the specified
group-ip-address
and
mask
.
access-list access-list deny
group-ip-address
[
mask
]
Example:
Router(config)#
access-list 90
Step 3
deny 224.0.0.0 15.255.255.255
Configures the access list so that it denies access to any IP
addresses other than the ones previously configured.
access-list access-list deny any
Example:
Router(config)#
access-list 90
deny any
Step 4
Enters interface configuration mode for the specified
interface bundle.
interface bundle bundle-number
Example:
Router(config)#
interface
bundle 10
Step 5
(Optional, but recommended) Configures the interface with
the access list, so that packets are filtered by the list before
being accepted on the interface.
ip access-group access-list
Example:
Router(config-if)#
ip
access-group 90
Step 6
Standard Access lists only allow one address to be
specified in the earlier step. If you apply an
outbound access-list with only the multicast address
of the tunnel denied, then the DSG traffic is not
allowed to pass.
Note
On the Cisco cBR-8 router, inbound access lists on
the cable interface do not apply to multicast traffic,
so they do not apply here. As a result, the Cisco
cBR-8 requires that you use extended access lists
that are blocked in the outbound direction for
packets originating from the cable modem or CPE
device on the network, and destined to the multicast
group. The multicast group contains the classifiers
associated with A-DSG 1.1 rules enabled on the
interface.
Note
Cisco cBR Series Converged Broadband Routers Application
—
Voice and Video Configuration Guide
26
Advanced-Mode DOCSIS Set-Top Gateway 1.2 for the Cisco CMTS Routers
Configuring a Standard IP Access List for Packet Filtering