2. Define extended ACL with number ID.
access-list access-list-number2 { permit | deny } [ protocol ] [ established ]
{ source-addr source-wildcard | any } [ port [ portmask ] ] { dest-addr dest-wildcard
| any } [ port [ portmask ] ] [ icmp-type [ icmp-code ] | icmp-packet ] [ fragments ]
{ [ precedence precedence ] [ tos tos ] | [ dscp dscp ] } [ time-range
time-range-name ]
3. Define Layer 2 ACL with number ID.
access-list access-list-number3 { permit | deny } [ protocol ] [ cos vlan-pri ]
ingress { { [ source-vlan-id ] [ source-mac-addr source-mac-wildcard ] [ interface
interface-num ] } | any } egress { { [ dest-mac-addr dest-mac-wildcard ] [ interface
interface-num | cpu ] } | any } [ time-range time-range-name ]
4. Define user-defined ACL with number ID.
access-list access-list-number4 { permit | deny } { rule-string rule-mask
offset }&<1-20> [ ingress interface interface-num ] [ egress interface
interface-num | cpu ] [ time-range time-range-name ]
5. Delete ACL or its subitem.
no access-list { all | { access-list-number | name access-list-name } [ subitem ] }
【Parameter】
access-list-number1:standard ACL rules in the range of 1~99
access-list-number2:extended ACL rules in the range of 100~199
access-list-number3:Layer 2 ACL rules in the range of 200~299
5-35