100% found this document useful (1 vote)
2K views1 page

Cisco Access List Commands Cheat Sheet

Standard and extended ACLs can be used to permit or deny traffic based on source addresses, protocols, TCP/UDP ports and flags. Standard ACLs filter based on source IP addresses while extended ACLs can also filter based on destination addresses, protocols, TCP/UDP ports and flags. ACLs are identified by numbers and are applied to interfaces to restrict ingress or egress traffic. Logging and time-range options can be used for troubleshooting and to enable rules only during certain times.

Uploaded by

Brad Thompson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views1 page

Cisco Access List Commands Cheat Sheet

Standard and extended ACLs can be used to permit or deny traffic based on source addresses, protocols, TCP/UDP ports and flags. Standard ACLs filter based on source IP addresses while extended ACLs can also filter based on destination addresses, protocols, TCP/UDP ports and flags. ACLs are identified by numbers and are applied to interfaces to restrict ingress or egress traffic. Logging and time-range options can be used for troubleshooting and to enable rules only during certain times.

Uploaded by

Brad Thompson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

packetlife.

net
by Jeremy Stretch v2.0
IOS IPV4 ACCESS LISTS
Standard ACL Syntax
permit
Actions
deny
remark
evaluate
Allow matched packets
Deny matched packets
Record a configuration comment
Evaluate a reflexive ACL
Extended ACL Syntax
! Legacy syntax
access-list <number> {permit | deny} <source> [log]
! Modern syntax
ip access-list standard {<number> | <name>}
[<sequence>] {permit | deny} <source> [log]
ACL Numbers
TCP Options
1-99
1300-1999
IP standard
100-199
2000-2699
IP extended
200-299 Protocol
300-399 DECnet
400-499 XNS
ack Match ACK flag
fin Match FIN flag
psh Match PSH flag
rst Match RST flag
syn Match SYN flag
Troubleshooting
show access-lists [<number> | <name>]
show ip access-lists [<number> | <name>]
show ip access-lists interface <interface>
show ip access-lists dynamic
show ip interface [<interface>]
show time-range [<name>]
! Legacy syntax
access-list <number> {permit | deny} <protocol> <source> [<ports>] <destination> [<ports>] [<options>]
! Modern syntax
ip access-list extended {<number> | <name>}
[<sequence>] {permit | deny} <protocol> <source> [<ports>] <destination> [<ports>] [<options>]
500-599 Extended XNS
600-699 Appletalk
700-799 Ethernet MAC
800-899 IPX standard
900-999 IPX extended
1000-1099 IPX SAP
1100-1199 MAC extended
1200-1299 IPX summary
urg
established
Match URG flag
Source/Destination Definitions
any Any address
host <address> A single address
<network> <mask> Any address matched by the wildcard mask
IP Options
dscp <DSCP> Match the specified IP DSCP
fragments Check non-initial fragments
option <option> Match the specified IP option
precedence {0-7} Match the specified IP precedence
ttl <count> Match the specified IP time to live (TTL)
TCP/UDP Port Definitions
eq <port> Not equal to
lt <port> Greater than
range <port> <port> Matches a range of port numbers
neq <port>
gt <port>
Equal to
Less than
Miscellaneous Options
reflect <name> Create a reflexive ACL entry
time-range <name> Enable rule only during the given time range
Applying ACLs to Restrict Traffic
interface FastEthernet0/0
ip access-group {<number> | <name>} {in | out}
Match packets in an
established session
Logging Options
log Log ACL entry matches
log-input
Log matches including
ingress interface and
source MAC address

You might also like