19-7
Catalyst 3550 Multilayer Switch Software Configuration Guide
78-11194-03
Chapter 19 Configuring Network Security with ACLs
Configuring Router ACLs
These are the steps to use ACLs:
Step 1
Create an ACL by specifying an access list number or name and access conditions.
Step 2
Apply the ACL to interfaces or terminal lines. You can also apply standard and extended IP ACLs to
VLAN maps.
The software supports these styles of ACLs or access lists for IP:
•
Standard IP access lists use source addresses for matching operations.
•
Extended IP access lists use source and destination addresses for matching operations and optional
protocol-type information for finer granularity of control.
These sections describe access lists and the steps for using them:
•
Access List Numbers, page 19-7
•
Creating a Numbered Standard ACL, page 19-8
•
Creating a Numbered Extended ACL, page 19-9
•
Creating Named Standard and Extended ACLs, page 19-14
•
Applying Time Ranges to ACLs, page 19-15
•
Including Comments About Entries in ACLs, page 19-18
Access List Numbers
The number you use to denote your ACL shows the type of access list that you are creating.
Table 19-1
lists the access-list number and corresponding access list type and shows whether or not they are
supported in the switch. The Catalyst 3550 switch supports IP standard and IP extended access lists,
numbers 1 to 199 and 1300 to 2699.
Table 19-1 Access List Numbers
Access List Number
Type
Supported
1–99
IP standard access list
Yes
100–199
IP extended access list
Yes
200–299
Protocol type-code access list
No
300–399
DECnet access list
No
400–499
XNS standard access list
No
500–599
XNS extended access list
No
600–699
AppleTalk access list
No
700–799
48-bit MAC address access list
No
800–899
IPX standard access list
No
900–999
IPX extended access list
No
1000–1099
IPX SAP access list
No
1100–1199
Extended 48-bit MAC address access list
No
1200–1299
IPX summary address access list
No