C
OMMAND
L
INE
I
NTERFACE
4-118
Example
This example accepts any incoming packets if the source address is within
subnet 10.7.1.x. For example, if the rule is matched; i.e., the rule (10.7.1.0
& 255.255.255.0) equals the masked address (10.7.1.2 & 255.255.255.0),
the packet passes through.
This allows TCP packets from class C addresses 192.168.1.0 to any
destination address when set for destination TCP port 80 (i.e., HTTP).
Related Commands
access-list ip (4-114)
show ip access-list
This command displays the rules for configured IP ACLs.
Syntax
show ip access-list
{
standard
|
extended
} [
acl_name
]
•
standard
– Specifies a standard IP ACL.
•
extended
– Specifies an extended IP ACL.
•
acl_name
– Name of the ACL. (Maximum length: 16 characters)
Command Mode
Privileged Exec
Example
Related Commands
permit, deny 4-115
ip access-group (4-119)
Console(config-ext-acl)#permit 10.7.1.1 255.255.255.0 any
Console(config-ext-acl)#
Console(config-ext-acl)#permit 192.168.1.0 255.255.255.0 any
destination-port 80
Console(config-ext-acl)#
Console#show ip access-list standard
IP standard access-list david:
permit host 10.1.1.21
permit 168.92.0.0 0.0.15.255
Console#
Summary of Contents for TigerSwitch 1000
Page 2: ......
Page 19: ...CONTENTS xv...
Page 23: ...TABLES xix...
Page 36: ...INTRODUCTION 1 10...
Page 155: ...PORT CONFIGURATION 3 107 Figure 3 50 Displaying Etherlike and RMON Statistics...
Page 222: ...CONFIGURING THE SWITCH 3 174...
Page 417: ...VLAN COMMANDS 4 195 This section describes commands used to configure private VLANs...
Page 466: ...TROUBLESHOOTING B 4...
Page 479: ......