Cisco IOS: Difference between revisions
|  (Created page with "Packet Capture (Catalyst 6506-E) # show monitor  # Show run | inc monitor session  (config)# no monitor session 1  (config)# monitor session 1 source vlan 1309  (config)# monitor session 1 destination interface Gi2/1/3  ACLs Insert into existing Standard ACL # show access-list 24 (config)# ip access-list standard 24 (config-std-nacl)# 15 permit 10.1.2.0 0.0.0.255 (config-std-nacl)# exit (config)# ip access-list resequence 24 10 10 Insert into existing Extended ACL # sh a...") | No edit summary | ||
| (One intermediate revision by the same user not shown) | |||
| Line 1: | Line 1: | ||
| Packet Capture (Catalyst 6506-E) | =Packet Capture= | ||
| (This example is on a Catalyst 6506-E) | |||
| # Show run | inc monitor session | # <code># show monitor</code> | ||
| # <code># Show run | inc monitor session</code> | |||
| # <code>(config)# no monitor session 1</code> | |||
| # <code>(config)# monitor session 1 source vlan 1309</code> | |||
| # <code>(config)# monitor session 1 destination interface Gi2/1/3</code> | |||
| =ACLs= | |||
| ===Insert into existing Standard ACL=== | |||
| (config)#  | # <code># show access-list 24</code> | ||
| # <code>(config)# ip access-list standard 24</code> | |||
| # <code>(config-std-nacl)# 15 permit 10.1.2.0 0.0.0.255</code> | |||
| # <code>(config-std-nacl)# exit</code> | |||
| # <code>(config)# ip access-list resequence 24 10 10</code> | |||
| ===Insert into existing Extended ACL=== | |||
| Insert into existing  | # <code># sh access-lists vlan2-out</code> | ||
| #  | # <code>(config)# ip access-list extended vlan2-out</code> | ||
| # <code>(config-ext-nacl)# 1421 permit tcp object-group VPN.CLIENTS host 10.1.49.23 eq 3389</code> | |||
| # <code>(config)# ip access-list resequence vlan2-out 10 10</code> | |||
| =VPN= | |||
| # sh access-lists vlan2-out | ==Some Useful Links== | ||
| (config)# ip access-list extended vlan2-out | |||
| (config-ext-nacl)# 1421 permit tcp object-group VPN.CLIENTS host 10.1.49.23 eq 3389 | |||
| (config)# ip access-list resequence vlan2-out 10 10 | |||
| VPN | |||
| Some Useful Links | |||
| [https://www.cisco.com/c/en/us/support/docs/routers/1700-series-modular-access-routers/71462-rtr-l2l-ipsec-split.html LAN-to-LAN IPsec Tunnel Between Two Routers Configuration Example] | [https://www.cisco.com/c/en/us/support/docs/routers/1700-series-modular-access-routers/71462-rtr-l2l-ipsec-split.html LAN-to-LAN IPsec Tunnel Between Two Routers Configuration Example] | ||
Revision as of 02:56, 12 February 2024
Packet Capture
(This example is on a Catalyst 6506-E)
- # show monitor
- # Show run | inc monitor session
- (config)# no monitor session 1
- (config)# monitor session 1 source vlan 1309
- (config)# monitor session 1 destination interface Gi2/1/3
ACLs
Insert into existing Standard ACL
- # show access-list 24
- (config)# ip access-list standard 24
- (config-std-nacl)# 15 permit 10.1.2.0 0.0.0.255
- (config-std-nacl)# exit
- (config)# ip access-list resequence 24 10 10
Insert into existing Extended ACL
- # sh access-lists vlan2-out
- (config)# ip access-list extended vlan2-out
- (config-ext-nacl)# 1421 permit tcp object-group VPN.CLIENTS host 10.1.49.23 eq 3389
- (config)# ip access-list resequence vlan2-out 10 10
VPN
Some Useful Links
LAN-to-LAN IPsec Tunnel Between Two Routers Configuration Example
Cisco IOS VPN Configuration Guide
Site-to-Site IKEv2 Tunnel between ASA and Router Configuration Examples
