IPv4 ACLs 44

Example

This example accepts any incoming packets if the source address is within subnet 10.7.1.x. For example, if the rule is matched; i.e., the rule (10.7.1.0 & 255.255.255.0) equals the masked address (10.7.1.2 & 255.255.255.0), the packet passes through.

Console(config-ext-acl)#permit 10.7.1.1 255.255.255.0 any Console(config-ext-acl)#

This allows TCP packets from class C addresses 192.168.1.0 to any destination address when set for destination TCP port 80 (i.e., HTTP).

Console(config-ext-acl)#permit 192.168.1.0 255.255.255.0 any destination-port 80

Console(config-ext-acl)#

This permits all TCP packets from class C addresses 192.168.1.0 with the TCP control code set to “SYN.”

Console(config-ext-acl)#permit tcp 192.168.1.0 255.255.255.0 any control-flag 2 2

Console(config-ext-acl)#

Related Commands

access-list ip (44-2)

show ip access-list

This command displays the rules for configured IPv4 ACLs.

Syntax

show ip access-list {standard extended} [acl_name]

standard – Specifies a standard IP ACL.

extended – Specifies an extended IP ACL.

acl_name – Name of the ACL. (Maximum length: 16 characters)

Command Mode

Privileged Exec

Example

Console#show ip access-list standard IP standard access-list david:

permit host 10.1.1.21

permit 168.92.0.0 255.255.15.0 Console#

Related Commands

permit, deny 44-2

ip access-group(44-6)

44-5

Page 393
Image 393
Accton Technology ES4548D, ES4524D manual Show ip access-list, This command displays the rules for configured IPv4 ACLs