EasyManuals Logo

Cisco Catalyst 3550 Series User Manual

Cisco Catalyst 3550 Series
992 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #558 background imageLoading...
Page #558 background image
28-20
Catalyst 3550 Multilayer Switch Software Configuration Guide
78-11194-09
Chapter 28 Configuring Network Security with ACLs
Configuring IP ACLs
A Layer 2 interface can have one IP access list applied to the input; a Layer 3 interface can have one
IP access list applied to the input and one IP access list applied to the output. If you apply an IP ACL
to an interface that already has an IP ACL configured (in that direction), the new ACL replaces the
previously configured one.
You can apply a port ACL only to a physical Layer 2 interface; you cannot apply port ACLs to
EtherChannel interfaces.
Beginning in privileged EXEC mode, follow these steps to restrict incoming and outgoing connections
between a virtual terminal line and the addresses in an ACL:
To remove access restrictions on a terminal line, use the no access-class access-list-number {in | out}
line configuration command.
Beginning in privileged EXEC mode, follow these steps to apply an IP access list to control access to a
Layer 2 or Layer 3 interface:
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
line [console | vty] line-number Identify a specific line for configuration, and enter in-line configuration
mode.
consoleEnter to specify the console terminal line. The console port
is DCE.
vtyEnter to specify a virtual terminal for remote console access.
The line-number is the first line number in a contiguous group that you want
to configure when the line type is specified. The range is from 0 to 16.
Step 3
access-class access-list-number
{in | out}
Restrict incoming or outgoing connections between a virtual terminal line
(into a device) by using the conditions in the specified access list.
Step 4
end Return to privileged EXEC mode.
Step 5
show running-config Display the access list configuration.
Step 6
copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
interface interface-id Identify a specific interface for configuration, and enter interface
configuration mode.
The interface can be a Layer 2 interface (port ACL) or a Layer 3 interface
(router ACL).
Step 3
ip access-group {access-list-number |
name} {in | out}
Control access to the specified interface by using the IP access list. You can
enter a standard or extended IP access number or name.
Note The out keyword is not valid for Layer 2 interfaces. Port ACLs are
supported only in the inbound direction.
Step 4
end Return to privileged EXEC mode.
Step 5
show running-config Display the access list configuration.
Step 6
copy running-config startup-config (Optional) Save your entries in the configuration file.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 3550 Series and is the answer not in the manual?

Cisco Catalyst 3550 Series Specifications

General IconGeneral
Form FactorRack-mountable
ManageableYes
RAM64 MB
Device TypeSwitch
MAC Address Table Size12000 entries
Routing ProtocolRIP
FeaturesVLAN support
Power SupplyAC 120/230 V (50/60 Hz)
Ports24 or 48 x 10/100Base-TX, 1 x GBIC, 2 x 10/100/1000Base-T
Operating Temperature32 to 113°F (0 to 45°C)

Related product manuals