696
access-list<num>{deny|permit}{any-source-mac|
{host-source-mac<host_smac>}|{<smac><smac-
mask>}}{any-destination-mac|{host-destination-m
ac <host_dmac>}|{<dmac><dmac-mask>}}tcp
{{<source><source-wildcard>}|any-source|
{host-source<source-host-ip>}}[s-port<port1>]
{{<destination><destination-wildcard>}|any-desti
nation| {host-destination <destination-host-ip>}}
[d-port <port3>] [ack+fin+psh+rst+urg+syn]
[precedence <precedence>] [tos
<tos>][time-range<time-range-name>]
Creates a numbered
mac-icmp extended mac-tcp
access rule; if the numbered
extended access-list of
specified number does not
exist, then an access-list will
be created using this
number.
access-list<num>{deny|permit}{any-source-mac|
{host-source-mac<host_smac>}|{<smac><smac-
mask>}}{any-destination-mac|{host-destination-m
ac
<host_dmac>}|{<dmac><dmac-mask>}}udp
{{<source><source-wildcard>}|any-source|
{host-source<source-host-ip>}}[s-port<port1>]
{{<destination><destination-wildcard>}|any-desti
nation| {host-destination<destination-host-ip>}}
[d-port <port3>] [precedence <precedence>] [tos
<tos>][time-range<time-range-name>]
Creates a numbered
mac-icmp extended mac-ip
access rule; if the numbered
extended access-list of
specified number does not
exist, then an access-list will
be created using this
number.
access-list<num>{deny|permit}{any-source-mac|
{host-source-mac<host_smac>}|{<smac><smac-
mask>}}
{any-destination-mac|{host-destination-mac
<host_dmac>}|{<dmac><dmac-mask>}}
{eigrp|gre|igrp|ip|ipinip|ospf|{<protocol-num>}}
{{<source><source-wildcard>}|any-source|
{host-source<source-host-ip>}}
{{<destination><destination-wildcard>}|any-desti
nation| {host-destination<destination-host-ip>}}
[precedence <precedence>] [tos
<tos>][time-range<time-range-name>]
Creates a numbered
extended mac-ip access
rule for other specific mac-ip
protocol or all mac-ip
protocols; if the numbered
extended access-list of
specified number does not
exist, then an access-list will
be created using this
number.
no access-list <num>
deletes this numbered
extended MAC-IP access
rule
9) Configuring a standard MAC-IP access-list based on nomenclature