
ip access-group
26-86
Authentication and Authorization Configuration
If
eq
port
is
not
specified,
TCP/UDP
ports
are
not
used
for
filtering.
Only
the
protocol,
source,
and
destination
are
used
for
applying
the
rule.
Mode
Global
configuration:
C3(su)
‐
>router(Config)#
Usage
Access
lists
are
applied
to
interfaces
by
using
the
ip
access
‐
group
command
as
described
in
“
ip
access
‐
group
”
on
page 26
‐
86.
Valid
access
‐
list
‐
numbers
for
extended
ACLs
are
100
to
199
.
For
standard
ACLs,
valid
values
are
1
to
99
.
All
access
lists
have
an
implicit
“deny
any
any”
statment
as
their
last
entry.
Examples
This
example
shows
how
to
define
access
list
145
to
deny
ICMP
transmissions
from
any
source
and
for
any
destination:
C3(su)->router(Config)#access-list 145 deny ICMP any any
This
example
appends
to
access
list
145
a
permit
statement
that
allows
the
host
with
IP
address
88.255.255.254
to
do
an
SSH
remote
login
to
any
destination
on
TCP
port
22.
C3(su)->router(Config)#access-list 145 permit tcp host 88.255.255.254 any eq 22
This
example
appends
to
access
list
145
a
permit
statement
that
allows
SNMP
control
traffic
(from
UDP
port
161)
to
be
sent
from
IP
addresses
within
the
range
defined
by
88.255.128.0
0.0.127.255
to
any
destination.
C3(su)->router(Config)#access-list 145 permit udp 88.255.128.0 0.0.127.255 eq 161
any
ip access-group
Use
this
command
to
apply
access
restrictions
to
inbound
frames
on
an
interface
when
operating
in
router
mode.
The
no
form
of
this
command
removes
the
specified
access
list.
Syntax
ip access-group access-list-number
in
no ip access-group access-list-number
in
Parameters
Defaults
None.
Mode
Interface
configuration:
C3(su)
‐
>router(Config
‐
if(Vlan
<vlan_id>))#
access
‐
list
‐
number
Specifies
the
number
of
the
access
list
to
be
applied
to
the
access
list.
This
is
a
decimal
number
from
1
to
199
.
in
Filters
inbound
frames.
Содержание SECURESTACK C3
Страница 2: ......
Страница 34: ...xxxii...
Страница 40: ...Getting Help xxxviii About This Guide...
Страница 126: ...clear license 4 6 Activating Licensed Features...
Страница 132: ...set port inlinepower 5 6 Configuring System Power and PoE...
Страница 228: ...clear port protected name 7 60 Port Configuration...
Страница 270: ...clear snmp interface 8 42 SNMP Configuration...
Страница 396: ...clear port txq 12 10 Port Priority Configuration...
Страница 414: ...ip igmp robustness 13 18 IGMP Configuration...
Страница 542: ...clear arpinspection statistics 17 32 DHCP Snooping and Dynamic ARP Inspection...
Страница 546: ...Enabling Router Configuration Modes 18 4 Preparing for Router Mode...
Страница 640: ...traceroute ipv6 21 10 IPv6 Management...
Страница 698: ...show ipv6 dhcp binding 24 20 DHCPv6 Configuration...
Страница 746: ...show ipv6 ospf virtual link 25 48 OSPFv3 Configuration...
Страница 834: ...ip access group 26 88 Authentication and Authorization Configuration...
Страница 848: ...TACACS Configuration clear tacacs interface 27 14...
Страница 866: ...sFlow Configuration show sflow agent 28 18...
Страница 872: ...Index 4...