Chapter 9
| Access Control Lists
IPv4 ACLs
– 271 –
permit, deny,
redirect-to
(Standard IP ACL)
This command adds a rule to a Standard IPv4 ACL. The rule sets a filter condition for
packets emanating from the specified source. Use the
no
form to remove a rule.
Syntax
{
permit
|
deny
|
redirect-to
interface
}
{
any
|
source bitmask |
host
source
}
[
time-range
time-range-name
]
no
{
permit
|
deny
|
redirect-to
interface
}
{
any
|
source bitmask |
host
source
}
interface
ethernet
unit
/
port
unit
- Unit identifier. (Range: 1)
port
- Port number. (Range: 1-28/52)
any
– Any source IP address.
source
– Source IP address.
bitmask
– Dotted decimal number representing the address bits to match.
host
– Keyword followed by a specific IP address.
time-range-name
- Name of the time range. (Range: 1-30 characters)
Default Setting
None
Command Mode
Standard IPv4 ACL
Command Usage
◆
New rules are appended to the end of the list.
◆
Address bit masks are similar to a subnet mask, containing four integers from 0
to 255, each separated by a period. The binary mask uses 1 bits to indicate
“match” and 0 bits to indicate “ignore.” The bitmask is bitwise ANDed with the
specified source IP address, and then compared with the address for each IP
packet entering the port(s) to which this ACL has been assigned.
Example
This example configures one permit rule for the specific address 10.1.1.21 and
another rule for the address range 168.92.16.x – 168.92.31.x using a bitmask.
Console(config-std-acl)#permit host 10.1.1.21
Console(config-std-acl)#permit 168.92.16.0 255.255.240.0
Console(config-std-acl)#
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...