19.10.2013 Views

7.6.1.0 - Force10 Networks

7.6.1.0 - Force10 Networks

7.6.1.0 - Force10 Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

To view which IP ACL is applied to an interface, use the show config command (Figure 173) in the<br />

INTERFACE mode or the show running-config command in the EXEC mode.<br />

Figure 173 show config Command in the INTERFACE Mode<br />

Use only Standard ACLs in the access-class command to filter traffic on Telnet sessions.<br />

Counting ACL Hits<br />

You can view the number of packets matching the ACL by using the count option when creating ACL<br />

entries. E-Series supports packet and byte counts simultaneously. C-Series supports only one at any given<br />

time.<br />

To view the number of packets match an ACL that is applied to an interface:<br />

Step Task<br />

<strong>Force10</strong>(conf-if)#show conf<br />

!<br />

interface GigabitEthernet 0/0<br />

ip address 10.2.1.100 255.255.255.0<br />

ip access-group nimule in<br />

no shutdown<br />

<strong>Force10</strong>(conf-if)#<br />

1 Create an ACL that uses rules with the count option. See Configuration Task List for IP ACLs on<br />

page 248<br />

2 Apply the ACL as an inbound or outbound ACL on an interface. See Assign an IP ACL to an Interface<br />

on page 255<br />

3 View the number of packets matching the ACL using the show ip accounting access-list from<br />

EXEC Privilege mode.<br />

Configuring Ingress ACLs<br />

Ingress ACLs are applied to interfaces and to traffic entering the system.These system-wide ACLs<br />

eliminate the need to apply ACLs onto each interface and achieves the same results. By localizing target<br />

traffic, it is a simpler implementation.<br />

256 IP Access Control Lists, Prefix Lists, and Route-maps

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!