EasyManua.ls Logo

Cisco Catalyst 2950 - Page 295

Cisco Catalyst 2950
376 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
12-13
Catalyst 2950 Desktop Switch Software Configuration Guide
78-11380-03
Chapter 12 Configuring Network Security with ACLs
Configuring ACLs
Beginning in privileged EXEC mode, follow these steps to create a standard access list using names:
Beginning in privileged EXEC mode, follow these steps to create an extended ACL using names:
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
ip access-list standard {name |
access-list-number}
Define a standard IP access list using a name, and enter access-list
configuration mode.
Note Thenamecanbeanumberfrom1to99.
Step 3
deny {source source-wildcard | host source |
any}
or
permit {source source-wildcard | host source |
any}
In access-list configuration mode, specify one or more conditions
denied or permitted to determine if the packet is forwarded or
dropped.
host source represents a source and source wildcard of source
0.0.0.0.
any represents a source and source wildcard of 0.0.0.0
255.255.255.255.
Note The log option is not supported on Catalyst 2950 switches.
Step 4
end Return to privileged EXEC mode.
Step 5
show access-lists [number | name] Show the access list configuration.
Step 6
copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
ip access-list extended {name |
access-list-number}
Define an extended IP access list by using a name, and enter
access-list configuration mode.
Note The name can be a number from 100 to 199.
Step 3
{deny | permit} protocol
{source source-wildcard | host source
| any}
[operator port]{destination
destination-wildcard | host destination
| any}
[operator port]
In access-list configuration mode, specify the conditions allowed
or denied.
See the Creating a Numbered Extended ACL section on
page 12-9 for definitions of protocols and other keywords.
host source represents a source and source wildcard of source
0.0.0.0, and host destination represents a destination and
destination wildcard of destination 0.0.0.0.
any represents a source and source wildcard or destination and
destination wildcard of 0.0.0.0 255.255.255.255.
Step 4
end Return to privileged EXEC mode.
Step 5
show access-lists [number | name] Show the access list configuration.
Step 6
copy running-config startup-config (Optional) Save your entries in the configuration file.

Table of Contents

Other manuals for Cisco Catalyst 2950

Related product manuals