288 Configuring Switch InformationConfiguring ACL Bindings with CLI CommandsThe following table summarizes the equivalent CLI commands for configuring ACL Bindings.The following is an example of some of the CLI commands:Configuring DHCP SnoopingDHCP Snooping expands network security by providing firewall security between untrusted interfacesand DHCP servers. By enabling DHCP Snooping network administrators can differentiate betweentrusted interfaces connected to end-users or DHCP Servers and untrusted interfaces located beyond thenetwork firewall.DHCP Snooping filters untrusted messages. DHCP Snooping creates and maintains a DHCP SnoopingTable which contains information received from untrusted packets. Interfaces are untrusted if the packetis received from an interface outside the network or from an interface beyond the network firewall.Trusted interfaces receive packets only from within the network or the network firewall.The DHCP Snooping Table contains the untrusted interfaces’ MAC address, IP address, Lease Time,VLAN ID, and interface information.The DHCP section contains the following topics:• Defining DHCP Snooping Properties• Defining DHCP Snooping on VLANs• Defining Trusted Interfaces• Adding Interfaces to the DHCP Snooping DatabaseTable 7-7. ACL Bindings CLI CommandsCLI Command Descriptionservice-acl input acl-nameno service-acl inputTo control access to an interface, use the service-acl command in interfaceconfiguration mode. To remove the access control, use the no form of this command.show access-lists [name] Use the show access-lists privileged EXEC command to display access control lists(ACLs) configured on the switch.Switch# show access-listsIP access list ACL1permit 234 172.30.40.1 0.0.0.0 anypermit 234 172.30.8.8 0.0.0.0 any