![background image](http://html.mh-extra.com/html/smc-networks/6128l2/6128l2_management-manual_1300638153.webp)
A
CCESS
C
ONTROL
L
ISTS
3-99
Web
– Click Security, ACL, Configuration. Enter an ACL name in the
Name field, select the list type (IP Standard, IP Extended, or MAC), and
click Add to open the configuration page for the new list.
Figure 3-43. Naming and Choosing ACLs
CLI
– This example creates a standard IP ACL named bill.
Configuring a Standard IP ACL
Command Attributes
•
Action
– An ACL can contain all permit rules or all deny rules.
(Default: Permit rules)
•
Address Type
– Specifies the source IP address. Use “Any” to include
all possible addresses, “Host” to specify a specific host address in the
Address field, or “IP” to specify a range of addresses with the Address
and SubMask fields. (Options: Any, Host, IP; Default: Any)
•
IP Address
– Source IP address.
•
Subnet Mask
– A subnet mask containing four integers from 0 to 255,
each separated by a period. The mask uses 1 bits to indicate “match”
and 0 bits to indicate “ignore.” The mask is bitwise ANDed with the
specified source IP address, and compared with the address for each
IP packet entering the port(s) to which this ACL has been assigned.
Console(config)#access-list ip standard bill
4-115
Console(config-std-acl)#
Summary of Contents for 6128L2
Page 2: ......
Page 21: ...CONTENTS xvii Glossary Index ...
Page 22: ...CONTENTS xviii ...
Page 26: ...TABLES xxii ...
Page 40: ...INTRODUCTION 1 10 ...
Page 54: ...INITIAL CONFIGURATION 2 14 ...
Page 193: ...PORT CONFIGURATION 3 139 Figure 3 61 Displaying Etherlike and RMON Statistics ...
Page 257: ...QUALITY OF SERVICE 3 203 Figure 3 90 Configuring Policy Maps ...
Page 313: ...COMMAND GROUPS 4 13 PE Privileged Exec VC VLAN Database Configuration ...
Page 592: ...TROUBLESHOOTING B 4 ...
Page 605: ......