Reference Guide

Access Control Lists (ACL) | 207
The following example shows the use of the remark command twice within the
CONFIGURATION-STANDARD-ACCESS-LIST mode. Here, the same sequence number was used
for the remark and for an associated ACL rule. The remark will precede the rule in the running-config
because it is assumed that the remark is for the rule with the same sequence number, or the group of
rules that follow the remark.
Example
Figure 9-1. Command Example: remark
Related
Commands
show config
c e s
Display the current ACL configuration.
Syntax
show config
Command Modes
CONFIGURATION-STANDARD-ACCESS-LIST
CONFIGURATION-EXTENDED-ACCESS-LIST
CONFIGURATION-MAC ACCESS LIST-STANDARD
CONFIGURATION-MAC ACCESS LIST-EXTENDED
Command
History
Example
Figure 9-2. Command Example: show config
Common IP ACL Commands
The following commands are available within both IP ACL modes (Standard and Extended) and do not
have mode-specific options. When an access-list (ACL) is created without any rule and then applied to
an interface, ACL behavior reflects an implicit permit.
FTOS(config-std-nacl)#remark 10 Deny rest of the traffic
FTOS(config-std-nacl)#remark 5 Permit traffic from XYZ Inc.
FTOS(config-std-nacl)#show config
!
ip access-list standard test
remark 5 Permit traffic from XYZ Inc.
seq 5 permit 1.1.1.0/24
remark 10 Deny rest of the traffic
seq 10 Deny any
FTOS(config-std-nacl)#
show config Display the current ACL configuration.
Version 8.1.1.0 Introduced on E-Series ExaScale
Version 7.6.1.0 Support added for S-Series
Version 7.5.1.0 Support added for C-Series
Version 6.2.1.1 Introduced
FTOS(config-ext-nacl)#show conf
!
ip access-list extended patches
FTOS(config-ext-nacl)#