C
ONFIGURING
THE
S
WITCH
3-100
Web
– Specify the action (i.e., Permit or Deny). Select the address type
(Any, Host, or IP). If you select “Host,” enter a specific address. If you
select “IP,” enter a subnet address and the mask for an address range. Then
click Add.
Figure 3-44. Configuring Standard IP ACLs
CLI
– This example configures one permit rule for the specific address
10.1.1.21 and another rule for the address range 168.92.16.x – 168.92.31.x
using a bitmask.
Configuring an Extended IP ACL
Command Attributes
•
Action
– An ACL can contain either all permit rules or all deny rules.
(Default: Permit rules)
•
Src/Dst Address Type
– Specifies the source or destination IP
address. Use “Any” to include all possible addresses, “Host” to specify
a specific host address in the Address field, or “IP” to specify a range
Console(config-std-acl)#permit host 10.1.1.21
4-116
Console(config-std-acl)#permit 168.92.16.0 255.255.240.0
Console(config-std-acl)#
Summary of Contents for 6128L2
Page 2: ......
Page 21: ...CONTENTS xvii Glossary Index ...
Page 22: ...CONTENTS xviii ...
Page 26: ...TABLES xxii ...
Page 40: ...INTRODUCTION 1 10 ...
Page 54: ...INITIAL CONFIGURATION 2 14 ...
Page 193: ...PORT CONFIGURATION 3 139 Figure 3 61 Displaying Etherlike and RMON Statistics ...
Page 257: ...QUALITY OF SERVICE 3 203 Figure 3 90 Configuring Policy Maps ...
Page 313: ...COMMAND GROUPS 4 13 PE Privileged Exec VC VLAN Database Configuration ...
Page 592: ...TROUBLESHOOTING B 4 ...
Page 605: ......