Solved

How to apply access-list 102 cisco 2911

Posted on 2010-11-09
1
1,069 Views
Last Modified: 2012-08-14
Hi there,
I am following this article:
http://www.cisco.com/en/US/products/ps5855/products_configuration_example09186a0080ac3082.shtml

I am stuch at these commands:
access-list 102 remark SDM_ACL Category=256
access-list 102 remark Outgoing Traffic
access-list 102 permit ip 10.10.10.0 0.0.0.255 10.77.241.0 0.0.0.255
access-list 102 remark Incoming Traffic
access-list 102 permit ip 10.77.241.0 0.0.0.255 10.10.10.0 0.0.0.255
!

Question:
My show run is attached.  In my case there is no access-list 102, how do I create it and which interface to apply and how, commands will be helpful.
Thanks
showrun2911EEpurposes.txt
0
Comment
Question by:amanzoor
1 Comment
 
LVL 5

Accepted Solution

by:
BooSTid earned 500 total points
ID: 34097070
typing those commands from the terminal configuration prompt will create that access-list. Each time you use the command "access-list 102 ...." it adds an entry to the bottom of that particular access list. The big thing to keep in mind when creating access lists is that they are processed from the top to the bottom, and order of entry is very important.

To apply an access list to an interface; you go to the desired interface, and then use the command:

ip access-group xxx in/out

where xxx is the access list number (or name), and in/out (choose one) specifies the traffic direction to match (from that interface's perspective).
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

There are two basic ways to configure a static route for Cisco IOS devices. I've written this article to highlight a case study comparing the configuration of a static route using the next-hop IP and the configuration of a static route using an outg…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now