22-8
Cisco Systems IntelligentGigabit Ethernet Switch Modules for the IBMBladeCenter, Software Configuration Guide
24R9746
Chapter22 Configuring Network Security with ACLs
Configuring ACLs
Note In addition to numbered standard and extended ACLs, you can also create named standard and extended
IP ACLs by using the supported numbers. That is, the name of a standard I P ACL can be 1 to 99; the
name of an extended IP ACL can be 100 to 199. The advantage of using named ACLs instead of
numbered lists is that you can delete individual entries from a namedlist.
Creating a Numbered Standard ACL
Note For information about creating ACLs to apply to a management interface, see the “Configuring IP
Services” section of the Cisco IOS IP and IP Routing Configuration Guide, Cisco IOS Release 12.1 and
the Cisco IOS IP and IP Routing Command Reference, Cisco IOS Release 12.1 . You can these apply
these ACLs only to a management interface.
Beginning in privileged EXEC mode, follow these steps to create a numbered standard IP ACL:
1200–1299 IPX summary address access list No
1300–1999 IP standard access list (expanded range) Yes
2000–2699 IP extended access list (expanded range) Yes
Table22-2 Access List Numbers (continued)
ACL Number Type Supported
Command Purpose
Step1 configure terminal Enter global configuration mode.
Step2 access-list access-list-number {deny | permit |
remark} {source source-wildcard | host source
| any}
Define a standard IP ACL by using a source address and wildcard.
The access-list-number is a decimal number from 1 to 99 or 1300
to 1999.
Enter deny or permit to specify whether to deny or permit access
if conditions are matched.
The source is the source address of the network or host from which
the packet is being sent:
The 32-bit quantity in dotted-decimal format.
The keyword any as an abbreviation for source and
source-wildcard of 0.0.0.0 255.255.255.255. You do not need
to enter a source wildcard.
The keyword host as an abbreviation for source and
source-wildcard of source 0.0.0.0.
(Optional) The source-wildcard applies wildcard bits to the
source. (See first bullet item.)
Note The log option is not supported on the switches.
Step3 end Return to privileged EXEC mode.