251
Chapter 24 Access control list configuration
Chapter contents
Introduction........................................................................................................................................................252
About access control lists .....................................................................................................................................252
What access lists do .......................................................................................................................................252
Why you should configure access lists ...........................................................................................................252
When to configure access lists .......................................................................................................................253
Features of access control lists .......................................................................................................................253
Access control list configuration task list..............................................................................................................254
Mapping out the goals of the access control list .............................................................................................254
Creating an access control list profile and enter configuration mode .............................................................255
Adding a filter rule to the current access control list profile ...........................................................................255
Adding an ICMP filter rule to the current access control list profile ..............................................................257
Adding a TCP, UDP or SCTP filter rule to the current access control list profile .........................................259
Binding and unbinding an access control list profile to an IP interface ..........................................................261
Displaying an access control list profile .........................................................................................................262
Debugging an access control list profile .........................................................................................................262
Examples .............................................................................................................................................................264
Denying a specific subnet ..............................................................................................................................264