Reference Guide

Access Control Lists (ACL) | 113
Example
Figure 6-1. Command Example: remark
FTOS(config-std-nacl)#remark 10 Deny rest of the traffic
FTOS(config-std-nacl)#remark 5 Permit traffic from XYZ Inc.
FTOS(config-std-nacl)#show config
!
ip access-list standard test
remark 5 Permit traffic from XYZ Inc.
seq 5 permit 1.1.1.0/24
remark 10 Deny rest of the traffic
seq 10 Deny any
FTOS(config-std-nacl)#
Related
Commands
show config
s z
Display the current ACL configuration.
Syntax
show config
Command Modes
CONFIGURATION-STANDARD-ACCESS-LIST
CONFIGURATION-EXTENDED-ACCESS-LIST
CONFIGURATION-MAC ACCESS LIST-STANDARD
CONFIGURATION-MAC ACCESS LIST-EXTENDED
Command
History
Example
Figure 6-2. Command Example: show config
FTOS(config-ext-nacl)#show conf
!
ip access-list extended patches
FTOS(config-ext-nacl)#
Common IP ACL Commands
The following commands are available within both IP ACL modes (Standard and Extended) and do not
have mode-specific options. When an access-list (ACL) is created without any rule and then applied to
an interface, ACL behavior reflects an implicit permit.
s (non-S4810) platforms support Ingress IP ACLs only.
The and z support both Ingress and Egress IP ACLs.
show config Display the current ACL configuration.
S6000
Version 9.0.2.0 Introduced on S6000.
Version 8.3.11.1 Introduced on the Z9000.
Version 7.6.1.0 Introduced on S-Series.
Version 6.2.1.1 Introduced
S6000