Cisco ONS 15454 Software Feature And Configuration Manual page 194

Sonet / sdh ml-series multilayer ethernet card
Hide thumbs Also See for ONS 15454:
Table of Contents

Advertisement

ML-Series ACL Support
Creating Named Standard IP ACLs
To create a named standard IP ACL, perform the following procedure, beginning in global configuration
mode:
Command
Step 1
Router(config)# ip access-list standard
name
Step 2
Router(config-std-nac1)# deny { source
[ source-wildcard ] | any}
or
permit { source [ source-wildcard ] | any}
Step 3
Router(config)# exit
Creating Named Extended IP ACLs (Control Plane Only)
To create a named extended IP ACL, perform the following tasks, beginning in global configuration
mode:
Command
Step 1
Router(config)# ip access-list extended
name
Step 2
Router(config-ext-nacl)# {deny | permit}
protocol source source-wildcard destination
destination-wildcard [precedence
precedence ] [tos tos ]
{deny | permit} protocol any any
{deny | permit} protocol host source host
destination
Applying the ACL to an Interface
After you create an ACL, you can apply it to one or more interfaces. ACLs can be applied on either the
inbound or the outbound direction of an interface. When controlling access to an interface, you can use
a name or number. If a standard ACL is applied, the ML-Series card compares the source IP address with
the ACL. To apply an ACL to one or more interfaces, use the command in
IP Standard ACLs applied to bridged egress interfaces are not supported in the data-plane. When
Note
bridging, ACLs are only supported on ingress.
Cisco ONS 15454 SONET/SDH ML-Series Multilayer Ethernet Card Software Feature and Configuration Guide, R4.0
15-4
Chapter 15
Purpose
Defines a standard IP ACL using an alphabetic
name.
In access-list configuration mode, specifies one or
more conditions as permitted or denied. This
determines whether the packet is passed or dropped.
Exits access-list configuration mode.
Purpose
Defines an extended IP ACL using an alphabetic
name.
In access-list configuration mode, specifies the
conditions allowed or denied.
Or:
Defines an extended IP ACL using an abbreviation
for a source and source wildcard of 0.0.0.0
255.255.255.255, and an abbreviation for a
destination and destination wildcard of 0.0.0.0
255.255.255.255.
Or:
Defines an extended IP ACL using an abbreviation
for a source and source wildcard of source 0.0.0.0,
and an abbreviation for a destination and
destination wildcard of destination 0.0.0.0.
Table
Configuring Access Control Lists
15-2.
78-15224-02

Advertisement

Table of Contents
loading

Table of Contents