
211
Chapter 19
Access control list configuration
Chapter contents
Introduction
........................................................................................................................................................212
About access control lists
.....................................................................................................................................212
What access lists do
.......................................................................................................................................212
Why you should configure access lists
...........................................................................................................212
When to configure access lists
.......................................................................................................................213
Features of access control lists
.......................................................................................................................213
Access control list configuration task list
..............................................................................................................214
Mapping out the goals of the access control list
.............................................................................................214
Creating an access control list profile and enter configuration mode
.............................................................215
Adding a filter rule to the current access control list profile
...........................................................................215
Adding an ICMP filter rule to the current access control list profile
..............................................................217
Adding a TCP, UDP or SCTP filter rule to the current access control list profile
.........................................219
Binding and unbinding an access control list profile to an IP interface
..........................................................221
Displaying an access control list profile
.........................................................................................................222
Debugging an access control list profile
.........................................................................................................222
Examples
.............................................................................................................................................................224
Denying a specific subnet
..............................................................................................................................224
Содержание IPLink Series
Страница 309: ...309 Appendix B Mode summary Chapter contents Introduction 310...
Страница 312: ...Introduction 312 IPLink Software Configuration Guide B Mode summary...
Страница 325: ...325 Appendix D Internetworking terms acronyms Chapter contents Abbreviations 326...
Страница 330: ...330 Appendix E Used IP ports in the IPLink software Chapter contents Used IP ports in the IPLink software 331...