In the event that an IP ACL is applied that has not been configured (for example, the name of the applied
ACL was configured incorrectly), the system uses an "undefined" ACL mechanism for filtering the packet(s).
This section provides information and instructions for applying ACLs and for configuring an "undefined"
ACL.
Applying the ACL to an Interface
To apply the ACL to an interface, use the following configuration:
configure
context acl_ctxt_name [ -noconfirm ]
interface interface_name
{ ip | ipv6 } access-group acl_list_name { in | out } [ preference ]
end
Notes:
•
The context name is the name of the ACL context containing the interface to which the ACL is to be
applied.
•
The ACL to be applied must be configured in the context specified by this command.
•
Up to 16 ACLs can be applied to a group provided that the number of rules configured within the ACL(s)
does not exceed the 128-rule limit for the interface.
Applying an ACL to an Individual Interface
This section provides information and instructions for applying one or more ACLs to an individual interface
configured on the system.
This section provides the minimum instruction set for applying the ACL list to an interface on the system.
For more information on commands that configure additional parameters and options, refer to the
Ethernet
Interface Configuration Mode Commands
chapter in the
Command Line Interface Reference
.
Important
To configure the system to provide ACL facility to subscribers:
Step 1
Apply the configured access control list by following the example configuration in
Applying the ACL to an Interface,
on page 190
Step 2
Verify that ACL is applied properly on interface by following the steps in
Verifying the ACL Configuration on an
Interface, on page 191
Step 3
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode
save configuration
command. For additional information refer to the
Verifying and Saving Your Configuration
chapter.
ASR 5500 System Administration Guide, StarOS Release 21.5
190
Access Control Lists
Applying the ACL to an Interface