PurposeCommand or Action
22
(Optional) Creates an IP extended access list, repeating the
command as many times as necessary.
access-list access-list-number {deny |
permit} protocol source
Step 4
source-wildcard destination
destination-wildcard
•
For access-list-number, enter the number specified
in Step 2.
Example:
Device(config)# access list 100
•
The deny keyword denies access if the conditions
are matched. The permit keyword permits access if
the conditions are matched.
permit ip 194.1.22.0 1.1.1.1
194.3.44.0 1.1.1.1
•
For protocol, enter ip as the protocol name.
•
For source, enter the number of the network or host
from which the packet is being sent.
•
For source-wildcard, enter the wildcard bits in dotted
decimal notation to be applied to the source. Place
ones in the bit positions that you want to ignore.
•
For destination, enter the number of the network or
host to which the packet is being sent.
•
For destination-wildcard, enter the wildcard bits in
dotted decimal notation to be applied to the
destination. Place ones in the bit positions that you
want to ignore.
Recall that the access list is always terminated by an
implicit deny statement for everything.
Returns to privileged EXEC mode.end
Example:
Device(config)# end
Step 5
Verifies your entries.show running-config
Example:
Device# show running-config
Step 6
(Optional) Saves your entries in the configuration file.copy running-config startup-config
Example:
Device# copy running-config
Step 7
startup-config
Routing Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9500 Switches)
38
Configuring MSDP
Controlling Source Information that Your Switch Forwards