Dell POWEREDGE M1000E User Manual

Page 752

Advertising
background image

34-16

Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide

OL-13270-03

Chapter 34 Configuring Network Security with ACLs

Configuring IPv4 ACLs

Beginning in privileged EXEC mode, follow these steps to create a standard ACL using names:

To remove a named standard ACL, use the no ip access-list standard name global configuration
command.

Beginning in privileged EXEC mode, follow these steps to create an extended ACL using names:

To remove a named extended ACL, use the no ip access-list extended name global configuration
command.

Command

Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

ip access-list standard name

Define a standard IPv4 access list using a name, and enter
access-list configuration mode.

The name can be a number from 1 to 99.

Step 3

deny {source [source-wildcard] | host source |
any} [log]

or

permit {source [source-wildcard] | host source
| any} [log]

In access-list configuration mode, specify one or more conditions
denied or permitted to decide if the packet is forwarded or dropped.

host source—A source and source wildcard of source 0.0.0.0.

any—A source and source wildcard of 0.0.0.0
255.255.255.255.

Step 4

end

Return to privileged EXEC mode.

Step 5

show access-lists [number | name]

Show the access list configuration.

Step 6

copy running-config startup-config

(Optional) Save your entries in the configuration file.

Command

Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

ip access-list extended name

Define an extended IPv4 access list using a name, and enter
access-list configuration mode.

The name can be a number from 100 to 199.

Step 3

{deny | permit} protocol {source
[source-wildcard] | host source | any}
{destination [destination-wildcard] | host
destination
| any} [precedence precedence]
[tos tos] [established] [log] [time-range
time-range-name]

In access-list configuration mode, specify the conditions allowed
or denied. Use the log keyword to get access list logging messages,
including violations.

See the

“Creating a Numbered Extended ACL” section on

page 34-11

for definitions of protocols and other keywords.

host source—A source and source wildcard of source 0.0.0.0.

host destination—A destination and destination wildcard of
destination 0.0.0.0.

any—A source and source wildcard or destination and
destination wildcard of 0.0.0.0 255.255.255.255.

Step 4

end

Return to privileged EXEC mode.

Step 5

show access-lists [number | name]

Show the access list configuration.

Step 6

copy running-config startup-config

(Optional) Save your entries in the configuration file.

Advertising