
Chapter 10
| Access Control Lists
ACL Information
– 382 –
show access-group
This command shows the port assignments of ACLs.
Command Mode
Privileged Executive
Example
Console#show access-group
Interface ethernet 1/2
MAC access-list jerry
Console#
show access-list
This command shows all ACLs and associated rules.
Syntax
show access-list
[[
arp
[
acl-name
]] |
[
ip
[
extended
[
acl-name
] |
standard
[
acl-name
]] |
[
ipv6
[
extended
[
acl-name
] |
standard
[
acl-name
]] |
[
mac
[
acl-name
]] | [
tcam-utilization
]] | [
hardware counters
]]
arp
– Shows ingress or egress rules for ARP ACLs.
hardware counters
– Shows statistics for all ACLs.
7
ip extended –
Shows ingress or egress rules for Extended IPv4 ACLs.
ip standard –
Shows ingress or egress rules for Standard IPv4 ACLs.
ipv6 extended –
Shows ingress or egress rules for Extended IPv6 ACLs.
ipv6 standard –
Shows ingress or egress rules for Standard IPv6 ACLs.
mac –
Shows ingress or egress rules for MAC ACLs.
tcam-utilization
– Shows the percentage of user configured ACL rules as a
percentage of total ACL rules
acl-name
– Name of the ACL. (Maximum length: 32 characters)
Command Mode
Privileged Exec
Example
Console#show access-list
IP standard access-list david:
permit host 10.1.1.21
permit 168.92.0.0 255.255.15.0
IP extended access-list bob:
permit 10.7.1.1 255.255.255.0 any
permit 192.168.1.0 255.255.255.0 any destination-port 80 80
permit 192.168.1.0 255.255.255.0 any protocol tcp control-code 2 2
7. Due to a hardware limitation, this option only displays statistics for permit rules.
Summary of Contents for ECS4120-28F
Page 36: ...Contents 36...
Page 38: ...Figures 38...
Page 46: ...Section I Getting Started 46...
Page 70: ...Chapter 1 Initial Switch Configuration Setting the System Clock 70...
Page 86: ...Chapter 2 Using the Command Line Interface CLI Command Groups 86...
Page 202: ...Chapter 5 SNMP Commands Additional Trap Commands 202...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 216: ...Chapter 7 Flow Sampling Commands 216...
Page 278: ...Chapter 8 Authentication Commands PPPoE Intermediate Agent 278...
Page 360: ...Chapter 9 General Security Measures Port based Traffic Segmentation 360...
Page 384: ...Chapter 10 Access Control Lists ACL Information 384...
Page 424: ...Chapter 11 Interface Commands Power Savings 424...
Page 446: ...Chapter 13 Power over Ethernet Commands 446...
Page 456: ...Chapter 14 Port Mirroring Commands RSPAN Mirroring Commands 456...
Page 488: ...Chapter 17 UniDirectional Link Detection Commands 488...
Page 494: ...Chapter 18 Address Table Commands 494...
Page 554: ...Chapter 20 ERPS Commands 554...
Page 620: ...Chapter 22 Class of Service Commands Priority Commands Layer 3 and 4 620...
Page 638: ...Chapter 23 Quality of Service Commands 638...
Page 772: ...Chapter 25 LLDP Commands 772...
Page 814: ...Chapter 26 CFM Commands Delay Measure Operations 814...
Page 836: ...Chapter 28 Domain Name Service Commands 836...
Page 848: ...Chapter 29 DHCP Commands DHCP Relay Option 82 848...
Page 902: ...Section III Appendices 902...
Page 916: ...Glossary 916...
Page 926: ...CLI Commands 926...
Page 937: ......
Page 938: ...E092017 CS R02...