hit counter script

Creating A Numbered Standard Acl - Cisco Catalyst 3550 series Software Configuration Manual

Multilayer switch
Hide thumbs Also See for Catalyst 3550 series:
Table of Contents

Advertisement

Chapter 28
Configuring Network Security with ACLs
Table 28-1 Access List Numbers (continued)
Access List Number
700–799
800–899
900–999
1000–1099
1100–1199
1200–1299
1300–1999
2000–2699
Note
In addition to numbered standard and extended ACLs, you can also create standard and extended named
IP ACLs using the supported numbers. That is, the name of a standard IP ACL can be 1 to 99; the name
of an extended IP ACL can be 100 to 199. The advantage of using named ACLs instead of numbered lists
is that you can delete individual entries from a named list.

Creating a Numbered Standard ACL

Beginning in privileged EXEC mode, follow these steps to create a numbered standard ACL:
Command
Step 1
configure terminal
Step 2
access-list access-list-number
{deny | permit}
source [source-wildcard] [log]
Step 3
end
78-11194-09
Type
48-bit MAC address access list
IPX standard access list
IPX extended access list
IPX SAP access list
Extended 48-bit MAC address access list
IPX summary address access list
IP standard access list (expanded range)
IP extended access list (expanded range)
Purpose
Enter global configuration mode.
Define a standard IP access list by using a source address and wildcard.
The access-list-number is a decimal number from 1 to 99 or 1300 to 1999.
Enter deny or permit to specify whether to deny or permit access if
conditions are matched.
The source is the source address of the network or host from which the
packet is being sent specified as:
The 32-bit quantity in dotted-decimal format.
The keyword any as an abbreviation for source and source-wildcard
of 0.0.0.0 255.255.255.255. You do not need to enter a
source-wildcard.
The keyword host as an abbreviation for source and source-wildcard
of source 0.0.0.0.
(Optional) The source-wildcard applies wildcard bits to the source.
(Optional) Enter log to create an informational logging message about the
packet that matches the entry to be sent to the console.
The log keyword is ignored on ACLs applied to Layer 2 interfaces.
Note
Return to privileged EXEC mode.
Catalyst 3550 Multilayer Switch Software Configuration Guide
Configuring IP ACLs
Supported
No
No
No
No
No
No
Yes
Yes
28-9

Advertisement

Table of Contents
loading

Table of Contents