251
Chapter 24
Access control list configuration
Chapter contents
Introduction
........................................................................................................................................................252
About access control lists
.....................................................................................................................................252
What access lists do
.......................................................................................................................................252
Why you should configure access lists
...........................................................................................................252
When to configure access lists
.......................................................................................................................253
Features of access control lists
.......................................................................................................................253
Access control list configuration task list
..............................................................................................................254
Mapping out the goals of the access control list
.............................................................................................254
Creating an access control list profile and enter configuration mode
.............................................................255
Adding a filter rule to the current access control list profile
...........................................................................255
Adding an ICMP filter rule to the current access control list profile
..............................................................257
Adding a TCP, UDP or SCTP filter rule to the current access control list profile
.........................................259
Binding and unbinding an access control list profile to an IP interface
..........................................................261
Displaying an access control list profile
.........................................................................................................262
Debugging an access control list profile
.........................................................................................................262
Examples
.............................................................................................................................................................264
Denying a specific subnet
..............................................................................................................................264