37-50
Catalyst 3750-E and 3560-E Switch Software Configuration Guide
OL-9775-08
Chapter 37 Configuring QoS
Configuring Standard QoS
To delete an access list, use the
no access-list
access-list-number
global configuration command.
This example shows how to allow access for only those hosts on the three specified networks. The
wildcard bits apply to the host portions of the network addresses. Any host with a source address that
does not match the access list statements is rejected.
Switch(config)#
access-list 1 permit 192.5.255.0 0.0.0.255
Switch(config)#
access-list 1 permit 128.88.0.0 0.0.255.255
Switch(config)#
access-list 1 permit 36.0.0.0 0.0.0.255
! (Note: all other access implicitly denied)
Creating an IP Extended ACL
Beginning in privileged EXEC mode, follow these steps to create an IP extended ACL for IPv4 traffic:
To delete an access list, use the
no access-list
access-list-number
global configuration command.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
access-list
access-list-number
{
deny
|
permit
}
protocol source source-wildcard
destination destination-wildcard
Create an IP extended ACL, repeating the command as many times as
necessary.
•
For
access-list-number
, enter the access list number. The range is
100 to 199 and 2000 to 2699.
•
Use the
permit
keyword to permit a certain type of traffic if the
conditions are matched. Use the
deny
keyword to deny a certain
type of traffic if conditions are matched.
•
For
protocol
, enter the name or number of an IP protocol. Use the
question mark (?) to see a list of available protocol keywords.
•
For
source
, enter the network or host from which the packet is
being sent. You specify this by using dotted decimal notation, by
using the
any
keyword as an abbreviation for
source
0.0.0.0
source-wildcard
255.255.255.255, or by using the
host
keyword
for
source
0.0.0.0.
•
For
source-wildcard
, enter the wildcard bits by placing ones in the
bit positions that you want to ignore. You specify the wildcard by
using dotted decimal notation, by using the
any
keyword as an
abbreviation for
source
0.0.0.0
source-wildcard
255.255.255.255,
or by using the
host
keyword for
source
0.0.0.0.
•
For
destination
, enter the network or host to which the packet is
being sent. You have the same options for specifying the
destination and destination-wildcard
as those described by
source
and
source-wildcard
.
Note
When creating an access list, remember that, by default, the end
of the access list contains an implicit deny statement for
everything if it did not find a match before reaching the end.
Step 3
end
Return to privileged EXEC mode.
Step 4
show access-lists
Verify your entries.
Step 5
copy running-config startup-config
(Optional) Save your entries in the configuration file.
Содержание Catalyst 3750-E Series
Страница 48: ...Contents xlviii Catalyst 3750 E and 3560 E Switch Software Configuration Guide OL 9775 08 ...
Страница 52: ...lii Catalyst 3750 E and 3560 E Switch Software Configuration Guide OL 9775 08 Preface ...
Страница 1414: ...Index IN 58 Catalyst 3750 E and 3560 E Switch Software Configuration Guide OL 9775 08 ...