A
CCESS
C
ONTROL
L
ISTS
3-99
Web
– Click Security, ACL, Configuration. Enter an ACL name in the
Name field, select the list type (IP Standard, IP Extended, or MAC), and
click Add to open the configuration page for the new list.
Figure 3-43. Naming and Choosing ACLs
CLI
– This example creates a standard IP ACL named bill.
Configuring a Standard IP ACL
Command Attributes
•
Action
– An ACL can contain all permit rules or all deny rules.
(Default: Permit rules)
•
Address Type
– Specifies the source IP address. Use “Any” to include
all possible addresses, “Host” to specify a specific host address in the
Address field, or “IP” to specify a range of addresses with the Address
and SubMask fields. (Options: Any, Host, IP; Default: Any)
•
IP Address
– Source IP address.
•
Subnet Mask
– A subnet mask containing four integers from 0 to 255,
each separated by a period. The mask uses 1 bits to indicate “match”
and 0 bits to indicate “ignore.” The mask is bitwise ANDed with the
specified source IP address, and compared with the address for each
IP packet entering the port(s) to which this ACL has been assigned.
Console(config)#access-list ip standard bill
4-115
Console(config-std-acl)#
Summary of Contents for 6152L2
Page 2: ......
Page 18: ...TABLES xiv ...
Page 32: ...INTRODUCTION 1 10 ...
Page 46: ...INITIAL CONFIGURATION 2 14 ...
Page 185: ...PORT CONFIGURATION 3 139 Figure 3 61 Displaying Etherlike and RMON Statistics ...
Page 249: ...QUALITY OF SERVICE 3 203 Figure 3 90 Configuring Policy Maps ...
Page 290: ...CONFIGURING THE SWITCH 3 244 ...
Page 303: ...COMMAND GROUPS 4 13 VC VLAN Database Configuration ...
Page 434: ...COMMAND LINE INTERFACE 4 144 ...
Page 568: ...TROUBLESHOOTING B 4 ...
Page 581: ......