当前位置:网站首页>Switch and Router Technology - 32 - Named ACL
Switch and Router Technology - 32 - Named ACL
2022-08-11 04:55:00 【w Spicy little prince】
Named ACL:
No table number, use name as table number, directly use standard to identify standard ACL, and extended to identify extension
Delete ACL
1. Before deleting the access control list, you need to cancel it from the application interface
2. Whether it is a standard ACL or an extended ACL, no matter which ACL is deleted, all deletions are deleted, and cannot be deleted individually
And adding ACL is automatically back row, cannot be inserted in the middle

![]()
![]()
![]()
Named ACL benefits:
You can delete a single ACL in a table or insert an ACL at any position
Specific configuration
Router(config)#ip access-list ?extended Extended Access Liststandard Standard Access ListRouter(config)#ip access-list extended wn //The extended ACL is named wnRouter(config-ext-nacl)#deny ?ahp Authentication Header Protocoleigrp Cisco's EIGRP routing protocolesp Encapsulation Security Payloadgre Cisco's GRE tunnelingicmp Internet Control Message Protocolip Any Internet Protocolospf OSPF routing protocoltcp Transmission Control Protocoludp User Datagram ProtocolRouter(config-ext-nacl)#deny icmp ?A.B.C.D Source addressany Any source hosthost A single source hostRouter(config-ext-nacl)#deny icmp host 192.168.10.2 ?A.B.C.D Destination addressany Any destination hosthost A single destination hostRouter(config-ext-nacl)#deny icmp host 192.168.10.2 host 192.168.30.2Router(config-ext-nacl)#deny icmp host 192.168.20.2 host 192.168.30.2Router(config-ext-nacl)#deny udp host 192.168.20.2 host 192.168.30.2 eq 53Router(config-ext-nacl)#deny tcp host 192.168.10.2 host 192.168.30.2 eq 80Router(config-ext-nacl)#permit ip any anyRouter(config-ext-nacl)#exitRouter(config)#int g0/1Router(config-if)#Router(config-if)#ip access-group wn inRouter(config-if)#exitRouter(config)#Router(config)#int g0/1 //Apply to interfaceRouter(config-if)#ip access-group wn outRouter(config-if)#Remove ACL
Step 1: Check the ACL number
Show access-lists

Assume deletion of acl number 20
Enter extended ACL;then no directly
Router(config)#ip access-list extended wn
Router(config-ext-nacl)#no 20

Specify ACL number
Router(config-ext-nacl)#?<1-2147483647> Sequence NumberRouter(config-ext-nacl)#12 deny icmp 192.168.20.2 0.0.0.0 192.168.30.2 0.0.0.0deny icmp 192.168.20.2 0.0.0.0 192.168.30.2 0.0.0.0 is equivalent to deny icmp 192.168.20.2 92.168.30.2
The 0.0.0.0 here is the inverse mask of 255.255.255.255, because acl needs an inverse mask to identify the subnet we use for an IPThe mask is four 255
边栏推荐
猜你喜欢

I wrote some code in my resume, but I still can't pass the interview

交换机和路由器技术-32-命名ACL

The principle, architecture, implementation, practice of "transfer" and "search", no need to be afraid of interviews

Switch---Spanning Tree---Three-layer Architecture Summary

交换机和路由器技术-26-OSPF末梢区域配置

Switches and routers technologies - 30 - standard acls

交换机和路由器技术-25-OSPF多区域配置

async(异步)和await的使用

Optimization is a kind of habit low starting point is the "standing near the critical"

ALSA音频架构 -- aplay播放流程分析
随机推荐
Bubble sort and heap sort
1815. Get the maximum number of groups of fresh donuts state compression
ERROR: Could not install packages due to an OSError: [Errno 2] 没有那个文件或目录: ‘/data/xxxx
Redis deletes keys in batches according to regular rules
C语句:数据存储
To break the bottleneck of transactional work, the gentleman signs the electronic contract to release the "source power" of HR!
交换机和路由器技术-29-OSPF虚链路
[E-commerce operation] How to formulate a social media marketing strategy?
绿盾加密如何顺利切换成IP-Guard加密
Harvesting of radio frequency energy
map and set - natural search and lookup semantics
论文笔记:Bag of Tricks for Long-Tailed Visual Recognition with Deep Convolutional Neural Networks
关于CC 攻击
交换机和路由器技术-28-OSPF的NSSA区域
Paper Notes: BBN: Bilateral-Branch Network with Cumulative Learning for Long-Tailed Visual Recognition
form form submission database Chinese becomes a question mark
Dry goods: The principle and practice of server network card group technology
MQ框架应用比较
3 模块二:科研工具使用
分层架构&SOA架构