![background image](http://html1.mh-extra.com/html/patton-electronics/smartware-r-3-20/smartware-r-3-20_software-configuration-manual_4044387206.webp)
206
Chapter 18
Access control list configuration
Chapter contents
Introduction
........................................................................................................................................................208
About access control lists
.....................................................................................................................................208
What access lists do
.......................................................................................................................................208
Why you should configure access lists
...........................................................................................................208
When to configure access lists
.......................................................................................................................209
Features of access control lists
.......................................................................................................................209
Access control list configuration task list
..............................................................................................................210
Mapping out the goals of the access control list
.............................................................................................210
Creating an access control list profile and enter configuration mode
.............................................................211
Adding a filter rule to the current access control list profile
...........................................................................211
Adding an ICMP filter rule to the current access control list profile
..............................................................213
Adding a TCP, UDP or SCTP filter rule to the current access control list profile
.........................................215
Binding and unbinding an access control list profile to an IP interface
..........................................................217
Displaying an access control list profile
.........................................................................................................218
Debugging an access control list profile
.........................................................................................................218
Examples
.............................................................................................................................................................220
Denying a specific subnet
..............................................................................................................................220