background image
492 Chapter 7: Understanding Access List Security
Example 7-15
Named IPX SAP Access List Configuration
configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#ipx access-list sap fred
R1(config-ipx-sap-nacl)#deny 2 7
R1(config-ipx-sap-nacl)#deny 3
R1(config-ipx-sap-nacl)#deny 4 7
R1(config-ipx-sap-nacl)#permit -1
R1(config-ipx-sap-nacl)#^Z
R1#show ipx access-lists
IPX sap access list fred
deny 2 7
deny 3
deny 4 7
permit FFFFFFFF
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#ipx access-list sap fred
R1(config-ipx-sap-nacl)#no deny 4 7
R1(config-ipx-sap-nacl)#^Z
R1#show ipx access-lists
IPX sap access list fred
deny 2 7
deny 3
permit FFFFFFFF
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#ipx access-list sap fred
R1(config-ipx-sap-nacl)#deny 4 7
R1(config-ipx-sap-nacl)#^Z
R1#show ipx access-lists
IPX sap access list fred
deny 2 7
deny 3
permit FFFFFFFF
deny 4 7
R1#config t
Enter configuration commands, one per line. End with CNTL/Z.
R1(config)#ipx access-list sap fred
R1(config-ipx-sap-nacl)#no permit -1
R1(config-ipx-sap-nacl)#permit -1
R1(config-ipx-sap-nacl)#^Z
R1#show ipx access-lists
IPX sap access list fred
deny 2 7
deny 3
deny 4 7
permit FFFFFFFF
ch07.fm Page 492 Monday, March 20, 2000 5:14 PM