Cisco Systems 3750E Ip access-list standard name, Any log, Ip access-list extended name, 34-16

Models: 3750E

1 1236
Download 1236 pages 40.08 Kb
Page 714
Image 714

Chapter 34 Configuring Network Security with ACLs

Configuring IPv4 ACLs

Beginning in privileged EXEC mode, follow these steps to create a standard ACL using names:

 

Command

Purpose

Step 1

 

 

configure terminal

Enter global configuration mode.

Step 2

 

 

ip access-list standard name

Define a standard IPv4 access list using a name, and enter

 

 

access-list configuration mode.

 

 

The name can be a number from 1 to 99.

 

 

 

Step 3 deny {source [source-wildcard] host source

In access-list configuration mode, specify one or more conditions

 

any} [log]

denied or permitted to decide if the packet is forwarded or dropped.

 

or

host source—A source and source wildcard of source 0.0.0.0.

 

permit {source [source-wildcard] host source

any—A source and source wildcard of 0.0.0.0

 

any} [log]

255.255.255.255.

Step 4

 

 

end

Return to privileged EXEC mode.

Step 5

 

 

show access-lists [number name]

Show the access list configuration.

Step 6

 

 

copy running-config startup-config

(Optional) Save your entries in the configuration file.

 

 

 

To remove a named standard ACL, use the no ip access-list standard name global configuration command.

Beginning in privileged EXEC mode, follow these steps to create an extended ACL using names:

 

Command

Purpose

Step 1

 

 

configure terminal

Enter global configuration mode.

Step 2

 

 

ip access-list extended name

Define an extended IPv4 access list using a name, and enter

 

 

access-list configuration mode.

 

 

The name can be a number from 100 to 199.

Step 3

 

 

{deny permit} protocol {source

In access-list configuration mode, specify the conditions allowed

 

[source-wildcard] host source any}

or denied. Use the log keyword to get access list logging messages,

 

{destination [destination-wildcard] host

including violations.

 

destination any} [precedence precedence]

See the “Creating a Numbered Extended ACL” section on

 

[tos tos] [established] [log] [time-range

 

page 34-11for definitions of protocols and other keywords.

 

time-range-name]

 

host source—A source and source wildcard of source 0.0.0.0.

 

 

 

 

host destination—A destination and destination wildcard of

 

 

destination 0.0.0.0.

 

 

any—A source and source wildcard or destination and

 

 

destination wildcard of 0.0.0.0 255.255.255.255.

Step 4

 

 

end

Return to privileged EXEC mode.

Step 5

 

 

show access-lists [number name]

Show the access list configuration.

Step 6

 

 

copy running-config startup-config

(Optional) Save your entries in the configuration file.

 

 

 

To remove a named extended ACL, use the no ip access-list extended name global configuration command.

 

Catalyst 3750-E and 3560-E Switch Software Configuration Guide

34-16

OL-9775-02

Page 714
Image 714
Cisco Systems 3750E manual Ip access-list standard name, Any log, Ip access-list extended name, 34-16