Standard ACLs
Last updated
Last updated
R1(config)#access-list 10 [permit | deny] [any | host | Network] [Wildcard Mask]
# This command will configure a standard ACL and a Access Control Entry
R1(config-if)#ip access-group [ Number | Name] [ in | out]
# This command will apply the ACL inbound or outbound on the desired interface
R1(config-line)#ip access-class [ Number | Name ] [ in | out]
# This command will apply the ACL inbound or outbound on the VTY lines of the Cisco network device
R1(config)#ip access-list 10 deny 10.10.10.0 0.0.0.255 log
# This command will configure a standard ACL and a Access Control Entry and also log any matches to the ACL
R1(config)#ip access-list 10 permit any log
# This command will permit any traffic that does not match our first entry. We need this because of the "implicit" deny at the end of every ACL
R1(config)#inteface eth0/0
# This command brings us into the sub-interface configuration mode
R1(config-if)#ip access-group 10 out
# This command applies the ACL outbound on interface eth0/0
R1(config)#access-list 20 deny 10.10.20.0 0.0.0.255 log
# This command will configure a standard ACL and a Access Control Entry and also log any traffic matches to the ACL
R1(config)#ip access-list 10 permit any log
# This command will permit any traffic that does not match our first entry. We need this because of the "implicit" deny at the end of every ACL
R1(config)#line vty 0 4
# This command will bring you into the VTY sub-configuration mode
R1(config-line)#ip access-class 20 in
This command will apply the ACL inbound to the VTY lines only
R2(config)#access-list 30 deny host 10.10.10.9 log
# This command will create the ACL and only filter based on a single source IP address
R2(config)#ip access-list 10 permit any log
# This command will permit any traffic that does not match our first entry. We need this because of the "implicit" deny at the end of every ACL
R2(config)#interface eth0/0.20
# This command will bring us into the sub-interface configuration mode
R2(config-subif)#ip access-class 30 out
# This command applies the ACL outbound on interface eth0/0.20
R1#show ip access-lists [ number | name]
# This command will show all access-lists or specific access-lists that we have created on our device
R1#show access-lists [number | name]
# This command will show all access-lists or specific access-lists that we have created on our device
R1#show run | se access
# This command will show us in the running-configuration what access-lists configuration we currently have.