•
Layer 3 Ethernet subinterfaces
•
Layer 3 Ethernet port-channel interfaces and subinterfaces
•
Tunnels
•
Loopback interfaces
•
Management interfaces
However, an ACL applied to a Layer 3 interface with the
ip port access-group
command is inactive unless
the port mode changes to access or trunk (Layer 2) mode. To apply an IPv4 ACL as a router ACL, use the
ip
access-group
command.
You can also apply an IPv4 ACL as a VLAN ACL. For more information, see the
match (VLAN access-map)
command.
The device applies port ACLs to inbound traffic only. The device checks inbound packets against the rules
in the ACL. If the first matching rule permits the packet, the device continues to process the packet. If the
first matching rule denies the packet, the device drops the packet and returns an ICMP host-unreachable
message.
If you delete the specified ACL from the device without removing the ACL from an interface, the deleted
ACL does not affect traffic on the interface.
If MAC packet classification is enabled on a Layer 2 interface, you cannot use the
ip port access-group
command on the interface.
This command does not require a license.
Examples
This example shows how to apply an IPv4 ACL named ip-acl-01 to Ethernet interface 2/1 as a port ACL:
switch#
configure terminal
switch(config)#
interface ethernet 2/1
switch(config-if)#
ip port access-group ip-acl-01 in
This example shows how to remove an IPv4 ACL named ip-acl-01 from Ethernet interface 2/1:
switch#
configure terminal
switch(config)#
interface ethernet 2/1
switch(config-if)#
no ip port access-group ip-acl-01 in
This example shows how to view the configuration of an Ethernet interface and the error message that appears
if you try to apply an IPv4 port ACL to the interface when MAC packet classification is enabled:
switch(config)#
show running-config interface ethernet 2/3
!Command: show running-config interface Ethernet2/3
!Time: Wed Jun 24 13:06:49 2009
version 4.2(1)
interface Ethernet2/3
ip access-group ipacl in
mac port access-group macacl
switchport
mac packet-classify
switch(config)#
interface ethernet 2/3
switch(config-if)#
ip port access-group ipacl in
ERROR: The given policy cannot be applied as mac packet classification is enable
d on this port
switch(config-if)#
Cisco Nexus 7000 Series Security Command Reference
420
I Commands
ip port access-group
Summary of Contents for Nexus 7000 Series
Page 2: ... Cisco Systems Inc All rights reserved ...
Page 20: ...Cisco Nexus 7000 Series Security Command Reference xx Contents ...
Page 62: ...Cisco Nexus 7000 Series Security Command Reference 36 A Commands aaa authentication rejected ...
Page 78: ...Cisco Nexus 7000 Series Security Command Reference 52 A Commands aaa user default role ...
Page 157: ...Cisco Nexus 7000 Series Security Command Reference 131 C Commands crypto ca import ...
Page 172: ...Cisco Nexus 7000 Series Security Command Reference 146 C Commands cts role based sgt map ...
Page 186: ...Cisco Nexus 7000 Series Security Command Reference 160 C Commands cts role based access list ...
Page 256: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 230 D Commands deny IPv4 ...
Page 271: ...protocol Cisco Nexus 7000 Series Security Command Reference 245 D Commands deny IPv6 ...
Page 274: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 248 D Commands deny IPv6 ...
Page 291: ...Cisco Nexus 7000 Series Security Command Reference 265 D Commands description identity policy ...
Page 293: ...Cisco Nexus 7000 Series Security Command Reference 267 D Commands description user role ...
Page 299: ...Cisco Nexus 7000 Series Security Command Reference 273 D Commands device role ...
Page 313: ...Cisco Nexus 7000 Series Security Command Reference 287 E Commands enable Cert DN match ...
Page 340: ...Cisco Nexus 7000 Series Security Command Reference 314 E Commands eq ...
Page 344: ...Cisco Nexus 7000 Series Security Command Reference 318 F Commands feature cts ...
Page 350: ...Cisco Nexus 7000 Series Security Command Reference 324 F Commands feature ldap ...
Page 369: ...G Commands gt page 344 Cisco Nexus 7000 Series Security Command Reference 343 ...
Page 372: ...Cisco Nexus 7000 Series Security Command Reference 346 G Commands gt ...
Page 398: ...Cisco Nexus 7000 Series Security Command Reference 372 I Commands interface policy deny ...
Page 497: ...Cisco Nexus 7000 Series Security Command Reference 471 K Commands key config key ...
Page 504: ...Cisco Nexus 7000 Series Security Command Reference 478 K Commands key string ...
Page 518: ...Cisco Nexus 7000 Series Security Command Reference 492 L Commands It ...
Page 536: ...Cisco Nexus 7000 Series Security Command Reference 510 M Commands monitor session ...
Page 552: ...Cisco Nexus 7000 Series Security Command Reference 526 O Commands other config flag ...
Page 569: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 543 P Commands permit IPv4 ...
Page 584: ...protocol Cisco Nexus 7000 Series Security Command Reference 558 P Commands permit IPv6 ...
Page 587: ...dscp dscp Cisco Nexus 7000 Series Security Command Reference 561 P Commands permit IPv6 ...
Page 622: ...Cisco Nexus 7000 Series Security Command Reference 596 P Commands propagate sgt ...
Page 664: ...Cisco Nexus 7000 Series Security Command Reference 638 R Commands rule ...
Page 737: ...Cisco Nexus 7000 Series Security Command Reference 711 Show Commands show arp access lists ...
Page 841: ...Cisco Nexus 7000 Series Security Command Reference 815 Show Commands show ipv6 dhcp ldra ...
Page 992: ...Cisco Nexus 7000 Series Security Command Reference 966 T Commands trustedCert ...
Page 1015: ...Cisco Nexus 7000 Series Security Command Reference 989 V Commands vlan policy deny ...
Page 1017: ...Cisco Nexus 7000 Series Security Command Reference 991 V Commands vrf policy deny ...
Page 1018: ...Cisco Nexus 7000 Series Security Command Reference 992 V Commands vrf policy deny ...