![]() This document discusses some commonly used standard and extended ACLs. These are examples of IP ACLs that can be configured in Cisco IOS Software: If no conditions match, the router rejects the packet because of an implicit deny all clause. Because the Cisco IOS Software stops the test of conditions after the first match, the order of the conditions is critical. ![]() The first match determines whether the Cisco IOS ® Software accepts or rejects the packet. The router tests packets against the conditions in the ACL one at a time. The IP ACL is a sequential collection of permit and deny conditions that apply to an IP packet. ACL criteria include:Ĭomplete these steps in order to construct an ACL as the examples in this document show: Your router examines each packet in order to determine whether to forward or drop the packet based on the criteria that you specify within the ACL. In order to filter network traffic, ACLs control whether routed packets are forwarded or blocked at the router interface. ![]() IP Access Control Lists filter packets based on: If your network is live, ensure that you understand the potential impact of any command. All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment. This document is not restricted to specific software and hardware versions. ![]() Refer to IP Addressing and Subnetting for New Users for additional information. Prerequisites RequirementsĮnsure that you meet this requirement before you attempt this configuration: ![]() This document describes sample configurations for commonly used IP Access Control Lists (ACLs), which filter IP packets. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |