Configuring Device Information 269Configuring ACL Bindings with CLI CommandsThe following table summarizes the equivalent CLI commands for configuring ACL Bindings.The following is an example of some of the CLI commands:Configuring DHCP SnoopingDHCP Snooping expands network security by providing firewall security between untrusted interfacesand DHCP servers. By enabling DHCP Snooping network administrators can differentiate betweentrusted interfaces connected to end-users or DHCP Servers and untrusted interfaces located beyond thenetwork firewall.DHCP Snooping filters untrusted messages. DHCP Snooping creates and maintains a DHCP SnoopingTable which contains information received from untrusted packets. Interfaces are untrusted if the packetis received from an interface outside the network or from an interface beyond the network firewall.Trusted interfaces receive packets only from within the network or the network firewall.The DHCP Snooping Table contains the untrusted interfaces’ MAC address, IP address, Lease Time,VLAN ID, and interface information.The DHCP section contains the following topics:• Defining DHCP Snooping Properties• Defining DHCP Snooping on VLANs• Defining Trusted Interfaces• Adding Interfaces to the DHCP Snooping DatabaseTable 7-7. ACL Bindings CLI CommandsCLI Command Descriptionservice-acl input acl-nameno service-acl inputTo control access to an interface, usethe service-acl command in interfaceconfiguration mode. To remove theaccess control, use the no form of thiscommand.show access-lists [name] Use the show access-lists privilegedEXEC command to display accesscontrol lists (ACLs) configured on theswitch.Switch# show access-listsIP access list ACL1permit 234 172.30.40.1 0.0.0.0 anypermit 234 172.30.8.8 0.0.0.0 any