
211
Chapter 19
Access control list configuration
Chapter contents
Introduction
........................................................................................................................................................212
About access control lists
.....................................................................................................................................212
What access lists do
.......................................................................................................................................212
Why you should configure access lists
...........................................................................................................212
When to configure access lists
.......................................................................................................................213
Features of access control lists
.......................................................................................................................213
Access control list configuration task list
..............................................................................................................214
Mapping out the goals of the access control list
.............................................................................................214
Creating an access control list profile and enter configuration mode
.............................................................215
Adding a filter rule to the current access control list profile
...........................................................................215
Adding an ICMP filter rule to the current access control list profile
..............................................................217
Adding a TCP, UDP or SCTP filter rule to the current access control list profile
.........................................219
Binding and unbinding an access control list profile to an IP interface
..........................................................221
Displaying an access control list profile
.........................................................................................................222
Debugging an access control list profile
.........................................................................................................222
Examples
.............................................................................................................................................................224
Denying a specific subnet
..............................................................................................................................224