34-16
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-12247-04
Chapter 34 Configuring Network Security with ACLs
Configuring IPv4 ACLs
Beginning in privileged EXEC mode, follow these steps to create a standard ACL using names:
To remove a named standard ACL, use the
no
ip access-list standard
name
global configuration
command.
Beginning in privileged EXEC mode, follow these steps to create an extended ACL using names:
To remove a named extended ACL, use the
no
ip access-list extended
name
global configuration
command.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
ip access-list standard
name
Define a standard IPv4 access list using a name, and enter
access-list configuration mode.
The name can be a number from 1 to 99.
Step 3
deny
{
source
[
source-wildcard
] |
host
source
|
any
} [
log
]
or
permit
{
source
[
source-wildcard
] |
host
source
|
any
} [
log
]
In access-list configuration mode, specify one or more conditions
denied or permitted to decide if the packet is forwarded or dropped.
•
host
source
—A source and source wildcard of
source
0.0.0.0.
•
any
—A source and source wildcard of 0.0.0.0
255.255.255.255.
Step 4
end
Return to privileged EXEC mode.
Step 5
show access-lists
[
number
|
name
]
Show the access list configuration.
Step 6
copy running-config startup-config
(Optional) Save your entries in the configuration file.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
ip access-list extended
name
Define an extended IPv4 access list using a name, and enter
access-list configuration mode.
The name can be a number from 100 to 199.
Step 3
{
deny
|
permit
}
protocol
{
source
[
source-wildcard
] |
host
source
|
any
}
{
destination
[
destination-wildcard
] |
host
destination
|
any
} [
precedence
precedence
]
[
tos
tos
] [
established
] [
log
] [
time-range
time-range-name
]
In access-list configuration mode, specify the conditions allowed
or denied. Use the
log
keyword to get access list logging messages,
including violations.
See the
“Creating a Numbered Extended ACL” section on
for definitions of protocols and other keywords.
•
host
source
—A source and source wildcard of
source
0.0.0.0.
•
host
destination
—A destination and destination wildcard of
destination
0.0.0.0.
•
any
—A source and source wildcard or destination and
destination wildcard of 0.0.0.0 255.255.255.255.
Step 4
end
Return to privileged EXEC mode.
Step 5
show access-lists
[
number
|
name
]
Show the access list configuration.
Step 6
copy running-config startup-config
(Optional) Save your entries in the configuration file.