16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series
Configuration Tasks
80
Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ
Creating a Numbered Standard ACL
Beginning in privileged EXEC mode, follow these steps to create a numbered standard ACL:
Use the no access-list access-list-number global configuration command to delete the entire ACL. You
cannot delete individual ACEs from numbered access lists.
Note
When creating an ACL, remember that, by default, the end of the ACL contains an implicit deny
statement for all packets that it did not find a match for before reaching the end. With standard access
lists, if you omit the ask from an associated IP host address ACL specification, 0.0.0.0 is assumed to
be the mask.
Creating a Numbered Extended ACL
Although standard ACLs use only source addresses for matching, you can use an extended ACL source
and destination addresses for matching operations and optional protocol type information for finer
granularity of control. Some protocols also have specific parameters and keywords that apply to that
protocol.
These IP protocols are supported (protocol keywords are in parentheses in bold): Internet Protocol (ip),
Transmission Control Protocol (tcp), or User Datagram Protocol (udp).
Command
Purpose
Step 1
configure terminal
Enters global configuration mode.
Step 2
access-list access-list-number {deny | permit |
remark} {source source-wildcard | host source
| any}
Defines a standard IP ACL by using a source address and wildcard.
The access-list-number is a decimal number from 1 to 99 or 1300
to 1999.
Enter deny or permit to specify whether to deny or permit access
if conditions are matched.
The source is the source address of the network or host from which
the packet is being sent:
•
The 32-bit quantity in dotted-decimal format.
•
The keyword any as an abbreviation for source and
source-wildcard of 0.0.0.0 255.255.255.255. You do not need
to enter a source-wildcard.
•
The keyword host as an abbreviation for source and
source-wildcard of source 0.0.0.0.
(Optional) The source-wildcard applies wildcard bits to the
source. (See first bullet item.)
Note
The log option is not supported on Ethernet switch network
modules.
Step 3
end
Returns to privileged EXEC mode.
Step 4
show access-lists [number | name]
Displays the access list configuration.
Step 5
copy running-config startup-config
(Optional) Saves your entries in the configuration file.