16- and 36-Port Ethernet Switch Module for Cisco 2600 Series, Cisco 3600 Series, and Cisco 3700 Series
Configuration Tasks
91
Cisco IOS Release 12.2(2)XT, 12.2(8)T, and 12.2(15)ZJ
Classifying Traffic by Using ACLs
You can classify IP traffic by using IP standard or IP extended ACLs.
Beginning in privileged EXEC mode, follow these steps to create an IP standard ACL for IP traffic:
To delete an ACL, use the no access-list access-list-number global configuration command.
Command
Purpose
Step 1
configure terminal
Enters global configuration mode.
Step 2
access-list access-list-number {deny |
permit | remark} {source source-wildcard
| host source | any}
Creates an IP standard ACL, repeating the command as many times as
necessary.
For access-list-number, enter the ACL number. The range is 1 to 99 and
1300 to 1999.
Enter deny or permit to specify whether to deny or permit access if
The source is the source address of the network or host from which the
packet is being sent, specified in one of three ways:
•
The 32-bit quantity in dotted-decimal format.
•
The keyword any as an abbreviation for source and
source-wildcard of 0.0.0.0 255.255.255.255. You do not need to
enter a source-wildcard.
•
The keyword host as an abbreviation for source and
source-wildcard of source 0.0.0.0.
(Optional) The source-wildcard applies wildcard bits to the source (see
first bullet item).
Note
Deny statements are not supported for QoS ACLS. See the
“Classification Based on QoS ACLs” section on page 32
for
more details.
Step 3
end
Returns to privileged EXEC mode.
Step 4
show access-lists
Verifies your entries.
Step 5
copy running-config startup-config
(Optional) Saves your entries in the configuration file.