<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ็How to find out what interface is ACL applied to? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4959229#M585189</link>
    <description>&lt;P&gt;that's sound good. it's never cross my mind that we can enable linux trick on cisco.&lt;/P&gt;</description>
    <pubDate>Tue, 14 Nov 2023 16:09:23 GMT</pubDate>
    <dc:creator>WINCis</dc:creator>
    <dc:date>2023-11-14T16:09:23Z</dc:date>
    <item>
      <title>็How to find out what interface is ACL applied to?</title>
      <link>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4958620#M585170</link>
      <description>&lt;P&gt;yes. I know that run command "show ip int" will work. but do i have to scroll down through a bunch of interface till i find what i looking for? is there another way to filterd base on specific acl?&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 03:41:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4958620#M585170</guid>
      <dc:creator>WINCis</dc:creator>
      <dc:date>2023-11-14T03:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: ็How to find out what interface is ACL applied to?</title>
      <link>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4958715#M585171</link>
      <description>&lt;P&gt;You can try this little regular expression&amp;nbsp; -I was looking for the interfaces that had ingress ACL "PREAUTH_ACL" applied. Sadly, IOS regular expressions are not like the unix "grep" command - grep has an option to print the &lt;EM&gt;preceding line&lt;/EM&gt; that matched your regular expression - that would have given us the cleaner output.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;SW1#show ip interface | include PREAUTH_ACL$|Ethernet

GigabitEthernet0/0 is administratively down, line protocol is down
GigabitEthernet1/0/1 is up, line protocol is up
GigabitEthernet1/0/2 is up, line protocol is up
GigabitEthernet1/0/3 is up, line protocol is up
GigabitEthernet1/0/4 is up, line protocol is up
GigabitEthernet1/0/5 is up, line protocol is up
GigabitEthernet1/0/6 is up, line protocol is up
GigabitEthernet1/0/7 is up, line protocol is up
GigabitEthernet1/0/8 is up, line protocol is up
GigabitEthernet1/0/9 is up, line protocol is up
GigabitEthernet1/0/10 is up, line protocol is up
GigabitEthernet1/0/11 is up, line protocol is up
GigabitEthernet1/0/12 is up, line protocol is up
GigabitEthernet1/0/13 is up, line protocol is up
GigabitEthernet1/0/14 is up, line protocol is up
GigabitEthernet1/0/15 is up, line protocol is up
GigabitEthernet1/0/16 is up, line protocol is up
GigabitEthernet1/0/17 is up, line protocol is up
GigabitEthernet1/0/18 is up, line protocol is up
GigabitEthernet1/0/19 is up, line protocol is up
GigabitEthernet1/0/20 is down, line protocol is down
  Inbound  access list is PREAUTH_ACL
GigabitEthernet1/0/21 is up, line protocol is up
GigabitEthernet1/0/22 is down, line protocol is down
  Inbound  access list is PREAUTH_ACL
GigabitEthernet1/0/23 is up, line protocol is up
GigabitEthernet1/0/24 is up, line protocol is up
GigabitEthernet1/1/1 is down, line protocol is down
GigabitEthernet1/1/2 is down, line protocol is down
GigabitEthernet1/1/3 is down, line protocol is down
GigabitEthernet1/1/4 is down, line protocol is down
TenGigabitEthernet1/1/1 is up, line protocol is up
TenGigabitEthernet1/1/2 is up, line protocol is up
TenGigabitEthernet1/1/3 is up, line protocol is up
TenGigabitEthernet1/1/4 is up, line protocol is up
TenGigabitEthernet1/1/5 is administratively down, line protocol is down
TenGigabitEthernet1/1/6 is administratively down, line protocol is down
TenGigabitEthernet1/1/7 is administratively down, line protocol is down
TenGigabitEthernet1/1/8 is up, line protocol is up
FortyGigabitEthernet1/1/1 is down, line protocol is down
FortyGigabitEthernet1/1/2 is down, line protocol is down
AppGigabitEthernet1/0/1 is up, line protocol is up&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FWIW, an example out from a standard unix grep command&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ArneBier_0-1699939947174.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/202351i9A65E5A93081B8B5/image-size/large?v=v2&amp;amp;px=999" role="button" title="ArneBier_0-1699939947174.png" alt="ArneBier_0-1699939947174.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Perhaps there is some hope with the IOS pipe format command.&amp;nbsp; I have not tried that.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;SW01#show ip interface | ?
  append    Append redirected output to URL (URLs supporting append operation only)
  begin     Begin with the line that matches
  count     Count number of lines which match regexp
  exclude   Exclude lines that match
  format    Format the output using the specified spec file
  include   Include lines that match
  redirect  Redirect output to URL
  section   Filter a section of output
  tee       Copy output to URL&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 05:34:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4958715#M585171</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-11-14T05:34:41Z</dc:date>
    </item>
    <item>
      <title>Re: ็How to find out what interface is ACL applied to?</title>
      <link>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4958736#M585172</link>
      <description>&lt;P&gt;Turns out, &lt;A href="https://community.cisco.com/t5/ip-telephony-and-phones/grep-in-ios-output/td-p/2186041" target="_self"&gt;you can enable grep on Cisco IOS&lt;/A&gt;. Who knew! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp; I tried it, but sadly, Cisco IOS grep doesn't contain that killer feature I was talking about&lt;/P&gt;
&lt;P&gt;But if you want to pull out all the stops, and have IOS-XE 16.6 and later, you can enable guest shell - then you have the full Linux power.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[guestshell@guestshell ~]$ dohost "show ip interface" | grep -B1 PREAUTH
GigabitEthernet1/0/20 is down, line protocol is down
  Inbound  access list is PREAUTH_ACL
--
GigabitEthernet1/0/22 is down, line protocol is down
  Inbound  access list is PREAUTH_ACL
[guestshell@guestshell ~]$ &lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 06:19:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4958736#M585172</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2023-11-14T06:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: ็How to find out what interface is ACL applied to?</title>
      <link>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4958817#M585176</link>
      <description>&lt;P&gt;&lt;SPAN&gt;show ip interface | include line protocol | acl-name&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This can give you some hint&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 08:30:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4958817#M585176</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-14T08:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: ็How to find out what interface is ACL applied to?</title>
      <link>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4959229#M585189</link>
      <description>&lt;P&gt;that's sound good. it's never cross my mind that we can enable linux trick on cisco.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 16:09:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4959229#M585189</guid>
      <dc:creator>WINCis</dc:creator>
      <dc:date>2023-11-14T16:09:23Z</dc:date>
    </item>
    <item>
      <title>Re: ็How to find out what interface is ACL applied to?</title>
      <link>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4959232#M585190</link>
      <description>&lt;P&gt;yep. it did give me a hint.&lt;BR /&gt;thanks a lot.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 16:10:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4959232#M585190</guid>
      <dc:creator>WINCis</dc:creator>
      <dc:date>2023-11-14T16:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: ็How to find out what interface is ACL applied to?</title>
      <link>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4959234#M585191</link>
      <description>&lt;P&gt;You are welcome&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 16:11:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/%E0%B9%87how-to-find-out-what-interface-is-acl-applied-to/m-p/4959234#M585191</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-14T16:11:18Z</dc:date>
    </item>
  </channel>
</rss>

