Service Manual
Applying an IP ACL
To apply an IP ACL (standard or extended) to a physical or port channel interface, use the following commands.
1. Enter the interface number.
CONFIGURATION mode
interface interface slot/port
2. Congure an IP address for the interface, placing it in Layer-3 mode.
INTERFACE mode
ip address ip-address
3. Apply an IP ACL to trac entering or exiting an interface.
INTERFACE mode
ip access-group access-list-name {in} [implicit-permit] [vlan vlan-range | vrf vrf-
range]
NOTE: The number of entries allowed per ACL is hardware-dependent. For detailed specication about entries
allowed per ACL, refer to your line card documentation.
4. Apply rules to the new ACL.
INTERFACE mode
ip access-list [standard | extended] name
To view which IP ACL is applied to an interface, use the show config command in INTERFACE mode, or use the show
running-config
command in EXEC mode.
Example of Viewing ACLs Applied to an Interface
Dell(conf-if)#show conf
!
interface GigabitEthernet 1/1
ip address 10.2.1.100 255.255.255.0
ip access-group nimule in
no shutdown
Dell(conf-if)#
To lter trac on Telnet sessions, use only standard ACLs in the access-class command.
Counting ACL Hits
You can view the number of packets matching the ACL by using the count option when creating ACL entries.
1. Create an ACL that uses rules with the count option. Refer to Congure a Standard IP ACL Filter.
2. Apply the ACL as an inbound or outbound ACL on an interface.
3. show ip accounting access-list
EXEC Privilege mode
View the number of packets matching the ACL.
Congure Ingress ACLs
Ingress ACLs are applied to interfaces and to trac entering the system.
These system-wide ACLs eliminate the need to apply ACLs onto each interface and achieves the same results. By localizing target
trac, it is a simpler implementation.
122
Access Control Lists (ACLs)