09-23-2013 04:37 AM - edited 03-04-2019 09:07 PM
Hi all,
I need to create a time-based ACL. I have been told that I just need to create the time-range and delete the existing access-list 199.
The rest of the config is already there as a nested policy map, so you will not need to apply anything to the interface.
Here is the policy map and class map:
class-map match-any MANCAM
match access-group 199
policy-map WAN-OUT
class MANCAM
police cir 256000
interface Serial0/0/0:1.1 point-to-point
service-policy output WAN-OUT
Can someone help?
Solved! Go to Solution.
09-23-2013 07:52 AM
A time range needs to be created an applied:
time-range MANCAM
periodic weekdays 08:00 to 17:00
ip access-list ext 199
no
permit tcp any any eq 80 time-range MANCAM
deny tcp any any eq 80
When the time range is in effect, Monday - Friday from 8 - 5PM, traffic to a web server will be allowed. If the time is outside of this range, the acl entry is bypassed and hits the second line to deny traffic to the web server. The same concept applies for policy maps as well. If the traffic is within the time range, the traffic is policed/shaped/dropped (whatever your policy does), and if it's outside of the range then it's would end up matching class default (or another class if you wanted ).
HTH,
John
*** Please rate all useful posts ***
09-23-2013 08:00 AM
If you have an existing acl you'll want to remove it before adding this one. Remember to add it in the correct sequence in your acl though.
Sent from Cisco Technical Support iPhone App
09-23-2013 07:52 AM
A time range needs to be created an applied:
time-range MANCAM
periodic weekdays 08:00 to 17:00
ip access-list ext 199
no
permit tcp any any eq 80 time-range MANCAM
deny tcp any any eq 80
When the time range is in effect, Monday - Friday from 8 - 5PM, traffic to a web server will be allowed. If the time is outside of this range, the acl entry is bypassed and hits the second line to deny traffic to the web server. The same concept applies for policy maps as well. If the traffic is within the time range, the traffic is policed/shaped/dropped (whatever your policy does), and if it's outside of the range then it's would end up matching class default (or another class if you wanted ).
HTH,
John
*** Please rate all useful posts ***
09-23-2013 07:57 AM
Ah ok. Thank you so much for assisting.
What is the 'no' line for ?
09-23-2013 08:00 AM
If you have an existing acl you'll want to remove it before adding this one. Remember to add it in the correct sequence in your acl though.
Sent from Cisco Technical Support iPhone App
09-23-2013 08:05 AM
Ah yes. Excellent.
Will do.
Thank you so much John. I get it now!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide