6-3
Cisco IOS XR Getting Started Guide
OL-10957-02
Chapter6 CLI Tips, Techniques, and Shortcuts
CLI Tips and Shortcuts

Step1 Enter the access-list command, followed by a space and a question mark, to list the available options for

the command:
RP/0/0/CPU0:router(config)# ipv4 access-list ?
log-update Control access lists log updates
maximum Out of resources configration
WORD Access list name - maximum 32 characters

Note The number ranges (within the angle brackets) are inclusive ranges.

Step2 Enter the access list name list1, followed by a space and another question mark, to display the arguments

that apply to the keyword and brief explanations:
RP/0/0/CPU0:router(config)# ipv4 access-list list1 ?
<1-2147483646> Sequence number for this entry
deny Specifies packets to reject
permit Specifies packets to forward
remark Comment for access list
<cr>
RP/0/0/CPU0:router(config)#ipv4 access-list list1

Step3 Enter the deny option and a question mark to see more command options:

RP/0/0/CPU0:router(config)#ipv4 access-list list1 deny ?
<0-255> An IPv4 Protocol Number
A.B.C.D Source IP address or prefix
ahp Authentication Header Protocol
any Any source host
eigrp Cisco's EIGRP Routing Protocol
esp Encapsulation Security Payload
gre Cisco's GRE Tunneling
host A single source host
icmp Internet Control Message Protocol
igmp Internet Gateway Message Protocol
igrp Cisco's IGRP Routing Protocol
ipinip IP in IP tunneling
ipv4 Any IPv4 Protocol
nos KA9Q NOS Compatible IP over IP Tunneling
ospf OSPF Routing Protocol
pcp Payload Compression Protocol
pim Protocol Independent Multicast
sctp Stream Control Transmission Protocol
tcp Transport Control Protocol
udp User Datagram Protocol
RP/0/0/CPU0:router(config)#ipv4 access-list list1 deny
Generally, uppercase letters represent variables (arguments).

Step4 Enter an IP address, followed by a space and a question mark (?), to list additional options:

RP/0/RP0/CPU0:router(config)# ipv4 access-list list1 deny 172.31.134.0 ?
A.B.C.D Wildcard bits
log Log matches against this entry
log-input Log matches against this entry, including input interface
<cr>
RP/0/RP0/CPU0:router(config)# ipv4 access-list list1 deny 172.31.134.0