Cisco SCE 1000 2xGBE User's Guide Page 98

  • Download
  • Add to my manuals
  • Print
  • Page
    / 490
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 97
Chapter 4 Installation and Startup
System Configuration
SCE 1000 2xGBE Release 2.0.10 User Guide
4-36 OL-7117-02
Table 4-11 IP address/Wildcard bit examples
Initial IP address Wildcard bits Range
10.1.1.0 0.0.0.255 10.1.1.0–10.1.1.255
10.1.1.0 0.0.0.63 10.1.1.0–10.1.1.63
10.1.1.0 0.0.0.0 10.1.1.0 (individual entry)
Order of Entries
The order of the entries in the list is important. The entries in the list are tested sequentially, and
the action is determined by the first entry that matches the connecting IP address. Therefore, when
the entry “any” appears in an Access Control List, all succeeding entries are irrelevant.
Consider two hypothetical ACLs containing the same entries in a different order.
The following list would permit access to all IP addresses, including 10.1.1.0:
permit any
deny 10.1.1.0
Note that the above list could not actually be created using the setup utility, since after the “any”
entry, no other entries could be added to the list.
The following list will deny access to IP address 10.1.1.0, but permit access to all others:
deny 10.1.1.0
permit any
If no entry in the assigned Access Control List matches the connection, or if the Access Control
List is empty, the default action is deny.
For a full explanation of how access control lists work, see Configuring Access Control Lists
(ACLs) (on page 6-2).
To create the access control lists:
Step 1 Enter the Access Control Lists configuration menu.
Would you like to enter the Access lists configuration menu? [no]: y
Type y and press Enter.
The Access Control Lists configuration dialog begins.
Step 2 You have the option of creating or modifying Access Control Lists, or skipping this
section and proceeding directly to assign the existing ACLs to the desired management
interfaces.
Would you like create new Access lists or modify existing lists? [no]: y
If you choose not to create or edit Access Control Lists, skip to Step 9: Configuring the
Topology-Dependent Parameters (on page 4-41).
Step 3 Type the number of the Access Control List to be configured (1 through 99) and press
Enter.
Note that there is no default for this parameter.
Page view 97
1 ... 97 98 99 ... 490

Comments to this Manuals

No comments