Edge Products ES3528-WDM User Manual

Page 392

Advertising
background image

Access Control List Commands

23-8

23

This shows that the entries in the mask override the precedence in which the rules
are entered into the ACL. In the following example, packets with the source address
10.1.1.1 are dropped because the “deny 10.1.1.1 255.255.255.255” rule has the
higher precedence according the “mask host any” entry.

This shows how to create a standard ACL with an ingress mask to deny access to
the IP host 171.69.198.102, and permit access to any others.

Console(config)#access-list ip standard A2
Console(config-std-acl)#permit 10.1.1.0 255.255.255.0
Console(config-std-acl)#deny 10.1.1.1 255.255.255.255
Console(config-std-acl)#exit
Console(config)#access-list ip mask-precedence in
Console(config-ip-mask-acl)#mask host any
Console(config-ip-mask-acl)#mask 255.255.255.0 any
Console(config-ip-mask-acl)#

Console(config)#access-list ip standard A2
Console(config-std-acl)#permit any
Console(config-std-acl)#deny host 171.69.198.102
Console(config-std-acl)#end
Console#show access-list
IP standard access-list A2:
deny host 171.69.198.102
permit any
Console#configure
Console(config)#access-list ip mask-precedence in
Console(config-ip-mask-acl)#mask host any
Console(config-ip-mask-acl)#exit
Console(config)#interface ethernet 1/1
Console(config-if)#ip access-group A2 in
Console(config-if)#end
Console#show access-list
IP standard access-list A2:
deny host 171.69.198.102
permit any
Console#

Advertising
This manual is related to the following products: