Configuring IPv4 ACLs
Command
Step 3
deny {source [source-wildcard] | host source |
any}
or
permit {source [source-wildcard] | host source
| any}
Step 4
end
Step 5
show access-lists [number | name]
Step 6
copy running-config startup-config
To remove a named standard ACL, use the no ip access-list standard name global configuration
command.
Beginning in privileged EXEC mode, follow these steps to create an extended ACL using names:
Command
Step 1
configure terminal
Step 2
ip access-list extended name
Step 3
{deny | permit} protocol {source
[source-wildcard] | host source | any}
{destination [destination-wildcard] | host
destination | any} [precedence precedence]
[tos tos] [established] [time-range
time-range-name]
Step 4
end
Step 5
show access-lists [number | name]
Step 6
copy running-config startup-config
To remove a named extended ACL, use the no ip access-list extended name global configuration
command.
When you are creating standard extended ACLs, remember that, by default, the end of the ACL contains
an implicit deny statement for everything if it did not find a match before reaching the end. For standard
ACLs, if you omit the mask from an associated IP host address access list specification, 0.0.0.0 is
assumed to be the mask.
After you create an ACL, any additions are placed at the end of the list. You cannot selectively add ACL
entries to a specific ACL. However, you can use no permit and no deny access-list configuration mode
commands to remove entries from a named ACL. This example shows how you can delete individual
ACEs from the named access list border-list:
Switch(config)# ip access-list extended border-list
Catalyst 2960 and 2960-S Switches Software Configuration Guide, Release 15.0(1)SE
31-14
Chapter 31
Purpose
In access-list configuration mode, specify one or more conditions
denied or permitted to decide if the packet is forwarded or dropped.
•
host source—A source and source wildcard of source 0.0.0.0.
•
any—A source and source wildcard of 0.0.0.0
255.255.255.255.
Return to privileged EXEC mode.
Show the access list configuration.
(Optional) Save your entries in the configuration file.
Purpose
Enter global configuration mode.
Define an extended IPv4 access list using a name, and enter
access-list configuration mode.
The name can be a number from 100 to 199.
In access-list configuration mode, specify the conditions allowed
or denied.
See the
"Creating a Numbered Extended ACL" section on
page 31-9
for definitions of protocols and other keywords.
host source—A source and source wildcard of source 0.0.0.0.
•
host destination—A destination and destination wildcard of
•
destination 0.0.0.0.
any—A source and source wildcard or destination and
•
destination wildcard of 0.0.0.0 255.255.255.255.
Return to privileged EXEC mode.
Show the access list configuration.
(Optional) Save your entries in the configuration file.
Configuring Network Security with ACLs
OL-26520-01