![Cisco 350XG series Скачать руководство пользователя страница 570](http://html.mh-extra.com/html/cisco/350xg-series/350xg-series_administration-manual_67491570.webp)
Access Control
ACL Binding
Cisco 350XG & 550XG Series 10G Stackable Managed Switches
550
25
-
User Defined
—Enter an ICMP code for filtering purposes.
STEP 5
Click
Apply
.
ACL Binding
When an ACL is bound to an interface (port, LAG or VLAN), its ACE rules are applied
to packets arriving at that interface. Packets that do not match any of the ACEs in
the ACL are matched to a default rule, whose action is to drop unmatched packets.
Although each interface can be bound to only one ACL, multiple interfaces can be
bound to the same ACL by grouping them into a policy-map, and binding that
policy-map to the interface.
After an ACL is bound to an interface, it cannot be edited, modified, or deleted until
it is removed from all the ports to which it is bound or in use.
NOTE
It is possible to bind an interface (port, LAG or VLAN) to a policy or to an ACL, but
they cannot be bound to both a policy and an ACL.
NOTE
In the same class map, a MAC ACL cannot be used with an IPv6 ACE that has a
Destination IPv6 address as a filtering condition.
ACL Binding (VLAN)
To bind an ACL to a VLAN:
STEP 1
Click
Access Control
>
ACL Binding (VLAN)
.
STEP 2
Select a VLAN and click
Edit
.
If the VLAN you require is not displayed, add a new one.
STEP 3
Select one of the following:
•
Select MAC-Based ACL
—Select a MAC-based ACL to be bound to the
interface.
•
Select IPv4-Based ACL
—Select an IPv4-based ACL to be bound to the
interface.
•
Select IPv6-Based ACL
—Select an IPv6-based ACL to be bound to the
interface.