Access Control Lists (ACLs) for the Series 3400cl and Series 6400cl Switches 
Configuring and Assigning an ACL 
Configuring a Named ACL 
You can use the “Named ACL” context to configure a standard or extended 
ACL with an alphanumeric name instead of a number. Note that the command 
structure for configuring a named ACL differs from that for a numbered ACL. 
Syntax:  ip access-list standard < name-str | 1-99 > 
< deny | permit > 
< any | host < src-ip-addr > | ip-addr / mask-length > 
[log] 
ip access-list extended < name-str | 100-199 > 
< deny | permit > ip 
< any | host < src-ip-addr > | ip-addr / mask-length > 
< any | host < dest-ip-addr > | ip-addr / mask-length > 
[log] 
ip access-list extended < name-string > 
< deny | permit > < tcp | udp > 
< any | host < src-ip-addr > | ip-addr / mask-length > 
[oper < src-port tcp/udp-id >] 
< any | host < dest-ip-addr > | ip-addr / mask-length > 
[oper < dest-port tcp/udp-id >] 
[log] 
These commands create an ACE in the named ACL list and:  
•  Indicate the action (deny or permit) to take on a packet  
if there is a match between a packet and the criteria in  
the complete ACE.  
•  Specify the packet protocol type (IP, TCP, or UDP) and (if  
TCP or UDP) the comparison operator. 
•  Specify the source and destination addressing options  
required for a match. 
•  Allow optional ACL logging where a packet has a match 
with a deny ACE. The log option does not appear when 
permit is the action. 
If the ACL does not already exist, these commands create  
the specified ACL and its first ACE. If the ACL already  
exists, these commands add a new, explicit ACE to the end  
of the ACL. For a match to occur, the packet must have the  
source and destination IP addressing criteria specified by  
this command, as well as any protocol-specific (TCP orUDP   
port number) criteria specified by the command. 
10-54