19.07.2013 Views

CCNP TSHOOT 6.0 - Cisco Learning Home

CCNP TSHOOT 6.0 - Cisco Learning Home

CCNP TSHOOT 6.0 - Cisco Learning Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>CCNP</strong>v6 <strong>TSHOOT</strong><br />

hp-collector HP Performance data collector<br />

hp-managed-node HP Performance data managed node<br />

hsrp Hot Standby Router Protocol<br />

http HTTP Protocol<br />

https Secure Hypertext Transfer Protocol<br />

ica ica (Citrix)<br />

icabrowser icabrowser (Citrix)<br />

icmp ICMP Protocol<br />

<br />

ACL-related Commands<br />

R1#show access-lists<br />

Standard IP access list 1<br />

10 permit 10.1.0.0, wildcard bits 0.0.255.255 (18 matches)<br />

Extended IP access list FW-ACL<br />

10 deny ip any any (29 matches)<br />

In the above example, two ACLs are configured on R1: a standard numbered ACL that identities internal NAT<br />

hosts, and an extended named ACL that blocks all traffic for a given direction (inbound or outbound). Statements<br />

in both are accumulating matches.<br />

R1#show access-lists FW-ACL<br />

Extended IP access list FW-ACL<br />

10 permit icmp any host 198.133.219.1 (13 matches)<br />

20 permit tcp any host 198.133.219.1 eq www<br />

30 permit udp host 192.168.2.1 host 192.168.1.1 eq ntp<br />

40 deny ip any any log (299 matches)<br />

In the above example, a specific named ACL is displayed. Note the log option on the deny ip any any<br />

statement. The use of this option produces logged message output on the console and syslog server, similar to<br />

that shown below. In this example, an NTP packet (port 123) from R2 to R1 is being denied.<br />

Dec 19 20:23:29.691: %SEC-6-IPACCESSLOGP: list FW-ACL denied udp 192.168.2.1(123) -<br />

> 192.168.1.1(123), 1 packet<br />

VACL-related Commands<br />

DLS2#show vlan access-map<br />

Vlan access-map "BLOCK-GUEST" 10<br />

Match clauses:<br />

ip address: GUEST-ACCESS-CTRL<br />

Action:<br />

drop<br />

Vlan access-map "BLOCK-GUEST" 20<br />

Match clauses:<br />

Action:<br />

Forward<br />

In the above example, access map BLOCK-GUEST has been configured with two match clauses. The first drops<br />

all traffic that matches the IP addresses specified in named ACL GUEST-ACCESS-CTRL. The second forwards<br />

all traffic that does not match the IP addresses specified in named ACL GUEST-ACCESS-CTRL. An implied<br />

deny all match clause is in effect at the end of the access map.<br />

All contents are Copyright © 1992–2010 <strong>Cisco</strong> Systems, Inc. All rights reserved. This document is <strong>Cisco</strong> Public Information. Page 12 of 16

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!