C H A P T E R
26-1
Cisco ME 3800X and 3600X Switch Software Configuration Guide
OL-23400-01
26
Configuring Network Security with ACLs
This chapter describes how to configure network security on the Cisco ME 3800X and 3600X switch by
using access control lists (ACLs), which are also referred to in commands and tables as access lists.
Information in this chapter about IP ACLs is specific to IP Version 4 (IPv4).
Note
ACLs are not supported on ports configured with Ethernet flow point (EFP) service instances.
For complete syntax and usage information for the commands used in this chapter, see the command
reference for this release, see the “Configuring IP Services” section in the “IP Addressing and Services”
chapter of the Cisco IOS IP Configuration Guide, Release 12.2, and the Cisco IOS IP Command
Reference, Volume 1 of 3: Addressing and Services, Release 12.2.
•
Understanding ACLs, page 26-1
•
Configuring IPv4 ACLs, page 26-6
•
Creating Named MAC Extended ACLs, page 26-26
•
Configuring VLAN Maps, page 26-29
•
Using VLAN Maps with Router ACLs, page 26-35
•
Displaying IPv4 ACL Configuration, page 26-39
Note
Not all ACL parameters can be used for QoS classification. See the
“Ingress Classification Based on QoS
ACLs” section on page 27-9
.
Understanding ACLs
Packet filtering can help limit network traffic and restrict network use by certain users or devices. ACLs
filter traffic as it passes through a router or switch and permit or deny packets crossing specified
interfaces or VLANs. An ACL is a sequential collection of permit and deny conditions that apply to
packets. When a packet is received on an interface, the switch compares the fields in the packet against
any applied ACLs to verify that the packet has the required permissions to be forwarded, based on the
criteria specified in the access lists. One by one, it tests packets against the conditions in an access list.
The first match decides whether the switch accepts or rejects the packets. Because the switch stops
testing after the first match, the order of conditions in the list is critical. If no conditions match, the
switch rejects the packet. If there are no restrictions, the switch forwards the packet; otherwise, the
switch drops the packet. The switch can use ACLs on all packets it forwards.