ip access-group 1 (in/out) access-class是控制路由器发起的telnet会话,不进行包过滤 access-group是控制接口上进出的数据包流量 ip access-group用在接口下;access-class用在VTY线下 access-class命令前面没有“ip” 当你配置好ACL之后,想把ACL应用到某个接口下,如Ethernet,FastEthernet,等等物理接口下,那么需要...
当你配置好ACL之后,想把ACL应用到某个接口下,如Ethernet,FastEthernet,等等物理接口下,那么需要用access-group 如果你想把ACL应用到VTY的接口下用于对网络设备的访问控制,那么就需要用access-class vty下: access-list 1 permit 10.110.1.111 line vty 0 4 access-class 1 in telnet访问设备上的line vty,in代表...
当你配置好ACL之后,想把ACL应用到某个接口下,如Ethernet,FastEthernet,等等物理接口下,那么需要用access-group 如果你想把ACL应用到VTY的接口下用于对网络设备的访问控制,那么就需要用access-classvty下:access-list 1 permit 10.110.1.111 line vty 0 4access-class1 i ...
here the ACL VTY OUT will work MHM 0 Helpful Reply krzysztofmaciejewskiit Level 1 In response to MHM Cisco World 04-21-2024 01:20 PM No, it does not work as I wrote, I connect from R6 to R5 via telnet and from R5 to R1 also via telnet (I expect that here my ACL ...
ip access-group 1 (in/out) access-class是控制路由器发起的telnet会话,不进行包过滤 access-group是控制接口上进出的数据包流量 ip access-group用在接口下;access-class用在VTY线下 access-class命令前面没有“ip” 当你配置好ACL之后,想把ACL应用到某个接口下,如Ethernet,FastEthernet,等等物理接口下,那么需要...
access-list 1 permit host 192.168.1.1 access-list 1 permit host 192.168.2.1 情况一:line vty 0 4(最多允许5个telnet) access-class 1 in 情况二:int f0/0 ip access-group 1 in 网页标题:ACL下ipaccess-group与ipaceess-class的区别用法 转载源于:http://pzhseo.com/article/gehjcc.html 其他...