32-16
Catalyst 3750 Switch Software Configuration Guide
OL-8550-02
Chapter 32 Configuring Network Security with ACLs
Configuring IPv4 ACLs
To remove a named standard ACL, use the
no
ip access-list standard
name
global configuration
command.
Beginning in privileged EXEC mode, follow these steps to create an extended ACL using names:
To remove a named extended ACL, use the
no
ip access-list extended
name
global configuration
command.
When you are creating standard extended ACLs, remember that, by default, the end of the ACL contains
an implicit
deny statement for everything if it did not find a match before reaching the end. For standard
ACLs, if you omit the mask from an associated IP host address access list specification, 0.0.0.0 is
assumed to be the mask.
Step 3
deny
{
source
[
source-wildcard
] |
host
source
|
any
} [
log
]
or
permit
{
source
[
source-wildcard
] |
host
source
|
any
} [
log
]
In access-list configuration mode, specify one or more conditions
denied or permitted to decide if the packet is forwarded or dropped.
•
host
source
—A source and source wildcard of
source
0.0.0.0.
•
any
—A source and source wildcard of 0.0.0.0
255.255.255.255.
Step 4
end
Return to privileged EXEC mode.
Step 5
show access-lists
[
number
|
name
]
Show the access list configuration.
Step 6
copy running-config startup-config
(Optional) Save your entries in the configuration file.
Command
Purpose
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
ip access-list extended
name
Define an extended IPv4 access list using a name, and enter
access-list configuration mode.
The name can be a number from 100 to 199.
Step 3
{
deny
|
permit
}
protocol
{
source
[
source-wildcard
] |
host
source
|
any
}
{
destination
[
destination-wildcard
] |
host
destination
|
any
} [
precedence
precedence
]
[
tos
tos
] [
established
] [
log
] [
time-range
time-range-name
]
In access-list configuration mode, specify the conditions allowed
or denied. Use the
log
keyword to get access list logging messages,
including violations.
See the
“Creating a Numbered Extended ACL” section on
page 32-11
for definitions of protocols and other keywords.
•
host
source
—A source and source wildcard of
source
0.0.0.0.
•
host
destination
—A destination and destination wildcard of
destination
0.0.0.0.
•
any
—A source and source wildcard or destination and
destination wildcard of 0.0.0.0 255.255.255.255.
Step 4
end
Return to privileged EXEC mode.
Step 5
show access-lists
[
number
|
name
]
Show the access list configuration.
Step 6
copy running-config startup-config
(Optional) Save your entries in the configuration file.
Содержание 3750G - Catalyst Integrated Wireless LAN Controller
Страница 80: ...1 28 Catalyst 3750 Switch Software Configuration Guide OL 8550 02 Chapter 1 Overview Where to Go Next ...
Страница 606: ...27 8 Catalyst 3750 Switch Software Configuration Guide OL 8550 02 Chapter 27 Configuring UDLD Displaying UDLD Status ...
Страница 670: ...31 18 Catalyst 3750 Switch Software Configuration Guide OL 8550 02 Chapter 31 Configuring SNMP Displaying SNMP Status ...
Страница 1048: ...41 20 Catalyst 3750 Switch Software Configuration Guide OL 8550 02 Chapter 41 Configuring MSDP Monitoring and Maintaining MSDP ...
Страница 1086: ...43 26 Catalyst 3750 Switch Software Configuration Guide OL 8550 02 Chapter 43 Troubleshooting Using the crashinfo Files ...
Страница 1104: ...B 4 Catalyst 3750 Switch Software Configuration Guide OL 8550 02 Appendix B Supported MIBs Using FTP to Access the MIB Files ...