Page 134
Configuring Access Control Lists
3.
Click
Apply
.
Removing an ACL
To delete one or more ACLs, select each entry to delete and click
Remove
.
Access Control List Configuration
Use this page to configure rules for the existing Access Control Lists (ACLs) on the system and to view
summary information about the rules that have been added to an ACL. Each ACL rule is configured to
match one or more aspects of traffic on the network. When a packet matches the conditions in a rule, it
is handled according to the configured action (permit or deny) and attributes. Each ACL can have mul-
tiple rules, but the final rule for every ACL is an implicit deny all rule. For each rule, a packet must
match all the specified criteria in order for the specified rule action (Permit/Deny) to take place.
To display the Access Control List Configuration page, click
QoS
>
Access Control Lists
in the navi-
gation pane, and click the
Configuration
tab.
Figure 97. Access Control List Configuration Page
Table 73. Access Control List Configuration Fields
Field
Description
ACL Identifier
The menu contains the ID for each ACL that exists on the system. Before you add or remove
a rule, you must select the ID of the ACL from the menu.
Sequence Number
The number that indicates the position of a rule within the ACL. If the sequence number is not
specified during rule creation, the rule is automatically assigned a sequence number after it
is successfully added to the ACL. The rules are displayed based on their position within the
ACL, but can also be renumbered. Packets are checked against the rule criteria in order, from
the lowest-numbered rule to the highest. When the packet matches the criteria in a rule, it is
handled according to the rule action and attributes. If no rule matches a packet, the packet is
discarded based on the implicit deny all rule, which is the final rule in every ACL.