Cisco Systems 7600 SERIES manual Verifying Vlan Access Map Configuration, 23-15

Page 15

Chapter 23 Configuring Network Security

Configuring VLAN ACLs

Command

Purpose

Router(config)# no vlan filter map_name [vlan-list

Removes the VLAN access map from the specified VLANs or

vlan_list interface type1 number2]

WAN interfaces.

 

 

1.type = pos, atm, or serial

2.number = slot/port or slot/port_adapter/port; can include a subinterface or channel group descriptor

When applying a VLAN access map, note the following syntax information:

You can apply the VLAN access map to one or more VLANs or WAN interfaces.

The vlan_list parameter can be a single VLAN ID or a comma-separated list of VLAN IDs or VLAN ID ranges (vlan_IDvlan_ID).

If you delete a WAN interface that has a VACL applied, the VACL configuration on the interface is also removed.

You can apply only one VLAN access map to each VLAN or WAN interface.

VACLs applied to VLANs are active only for VLANs with a Layer 3 VLAN interface configured. VACLs applied to VLANs without a Layer 3 VLAN interface are inactive. With releases 12.1(13)E and later, applying a VLAN access map to a VLAN without a Layer 3 VLAN interface creates an administratively down Layer 3 VLAN interface to support the VLAN access map. If creation of the Layer 3 VLAN interface fails, the VACL is inactive.

You cannot apply a VACL to a secondary private VLAN. VACLs applied to primary private VLANs also apply to secondary private VLANs.

Use the no keyword to clear VLAN access maps from VLANs or WAN interfaces.

See the “VLAN Access Map Configuration and Verification Examples” section on page 23-15.

Verifying VLAN Access Map Configuration

To verify VLAN access map configuration, perform this task:

Command

 

 

Purpose

 

 

 

 

Router# show

vlan

access-map [map_name]

Verifies VLAN access map configuration by displaying the

 

 

 

 

content of a VLAN access map.

 

 

 

 

 

Router#

show

vlan

filter [access-map map_name vlan

Verifies VLAN access map configuration by displaying the

vlan_id

interface type1 number2]

mappings between VACLs and VLANs.

 

 

 

 

 

1.type = pos, atm, or serial

2.number = slot/port or slot/port_adapter/port; can include a subinterface or channel group descriptor

VLAN Access Map Configuration and Verification Examples

Assume IP-named ACL net_10 and any_host are defined as follows:

Router# show ip access-lists net_10 Extended IP access list net_10

permit ip 10.0.0.0 0.255.255.255 any

Router# show ip access-lists any_host Standard IP access list any_host

permit any

 

 

Cisco 7600 Series Router Cisco IOS Software Configuration Guide—12.1E

 

 

 

 

 

 

78-14064-04

 

 

23-15

 

 

 

 

 

Image 15
Contents ACL Configuration Guidelines This chapter consists of these sections23-1 23-2 Hardware and Software ACL Support23-3 Determining Layer 4 Operation Usage23-4 Configuring the Cisco IOS Firewall Feature SetDetermining Logical Operation Unit Usage More detailed example follows23-5 Cisco IOS Firewall Feature Set Support OverviewGuidelines Firewall Configuration Guidelines and RestrictionsConfiguring Cbac on Cisco 7600 Series Routers Restrictions23-7 Configuring MAC Address-Based Traffic Blocking23-8 Configuring Vlan ACLsUnderstanding VACLs Vacl OverviewIgmp packets are not checked against VACLs VACLs and Cbac cannot be configured on the same interfaceBridged Packets Same interface23-10 Routed Packets23-11 Configuring VACLsThese sections describe configuring VACLs Multicast Packets23-12 Vacl Configuration OverviewDefining a Vlan Access Map To define a Vlan access map, perform this task23-13 Configuring a Match Clause in a Vlan Access Map SequenceConfigures the match clause in a Vlan access map sequence Deletes the match clause in a Vlan access map sequenceConfiguring an Action Clause in a Vlan Access Map Sequence Applying a Vlan Access Map23-14 Verifying Vlan Access Map Configuration Vlan Access Map Configuration and Verification Examples23-15 23-16 Configuring a Capture Port23-17 Configuring Vacl Logging23-18 Configuring TCP InterceptEnabling Self-Pinging Configuring Unicast Reverse Path ForwardingConfiguring Unicast RPF Understanding Unicast RPF Support23-20 Configuring the Unicast RPF Checking ModeConfiguring Unicast Flood Protection This example shows how to verify the configuration23-21 23-22 Configuring MAC Move Notification23-23 23-24
Related manuals
Manual 74 pages 38.06 Kb