Solved

cisco 2911 access-list 101

Posted on 2011-09-24
6
884 Views
Last Modified: 2012-05-12
Hi there,
At the moment my access list is like:
    10 deny ip 72.184.0.0 0.0.0.255 any
    20 deny ip 175.43.68.0 0.0.0.255 any
    30 deny ip 117.135.204.0 0.0.0.255 any
    40 deny ip 64.207.56.0 0.0.0.255 any
    50 deny ip 120.39.11.0 0.0.0.255 any
    60 deny ip 183.62.0.0 0.0.255.255 any
and soo on
Problem:  If I want to put any new deny entry say like:
11 deny ip 184.71.0.0 0.0.0.255 any
for some reason when the router is reloaded it does not save entry 11, what is wrong.  Also if I want to put any new entry at the extreme end then my deny goes very down.  Someone told me that deny entries should be at the top.  How can I use the entry numbers so that my ACL of deny entries stays on top and is saved as well.
Help
0
Comment
Question by:amanzoor
6 Comments
 
LVL 18

Accepted Solution

by:
jmeggers earned 167 total points
ID: 36594230
The sequence number insert should work correctly.  When you save your configuration, have you checked your startup config (show start) to see whether the change is saved in there?
0
 
LVL 50

Assisted Solution

by:Don Johnston
Don Johnston earned 167 total points
ID: 36595049
Sounds like you're not issuing a "copy run start" (wr mem) after adding the line to your ACL.
0
 
LVL 4

Author Comment

by:amanzoor
ID: 36595544
jmeggers and donjohnston:
Thanks guys, I usually use 'copy run start'.  Then I disconnect the session and login to check my changed ACL at that point it shows me.  Recently I issued 'reload' and all my ACL changes starting from 11,12,13,14,15,16,17,18 were gone.  So I starting to think if its something to do with the sequence #.  But as you are saying to use:
copy run start (wr mem)...............<<<<<what will be the difference between copy run start and this command?  As I log back on to a new sessoin and it shows me at that time that my sequence # 11,12,13,14........are there.
I will try with wr mem and let you know.
Thanks
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 50

Expert Comment

by:Don Johnston
ID: 36595557
>copy run start (wr mem)...............<<<<<what will be the difference between copy run start and this command?

Nothing. They do the same thing.

0
 
LVL 2

Assisted Solution

by:adrianuta2004
adrianuta2004 earned 166 total points
ID: 36597401
are you sure that your new entries dissapear ? when you insert line 11 ( between line 10 and 20 ) after reload, line 11 became line 20 and line 20 became line 30 :)
0
 
LVL 4

Author Comment

by:amanzoor
ID: 36815807
adianuta2004:
I will keep an eye on what you suggested.
Thanks
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Problem Description:   Couple of months ago we upgraded the ADSL line at our branch office from Home to Business line. The purpose of transforming the service to have static public IP’s. We were in need for public IP’s to publish our web resour…
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now