The access-list and access-group in the reply above will only allow TCP port 80 traffic in that interface. *All* other traffic will be dropped.
If you want to see whats coming on port 80 you could apply a similiar ACL with the log-input option to log it to the log for a few minutes.
access-list 101 permit tcp any any eq 80 log-input
access-list 101 permit ip any any
ip access-group 101 in
You could also debug the traffic without applying the Access-list to the interface.
to do this do:
under config: access-list 101 permit tcp any any eq 80
debug interface s0/0
debug ip packet 101
this narrows the debugs to the s0/0 interface and only for tcp port 80 traffic
Type 'u all' to end the debug. Be ready to enter this, or hit up arrow 3 times to get the u all entered before the debug commands just incase there is a flood of traffic that overwhelms the console/telnet output and possibly the router. After doing a u all the debug may scroll by for awhile because it's buffered up...
The reason you want to disable fast-switching is because the first packet gets process-switched by CPU and then a cache entry is made and rest of flow is fast-switched. debug traffic only shows process-switched traffic.
Be very careful with the debug command, it may make your router unresponsive and require a reboot to clear. I would recommend using the logging function of your acl. Also, you may want to point your logging to a server/client to make sure you get everything. Otherwise, you may only get a couple minutes with the router's log.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...