253
Chapter 24 Access control list configuration
Chapter contents
Introduction........................................................................................................................................................254
About access control lists .....................................................................................................................................254
What access lists do .......................................................................................................................................254
Why you should configure access lists ...........................................................................................................254
When to configure access lists .......................................................................................................................255
Features of access control lists .......................................................................................................................255
Access control list configuration task list..............................................................................................................256
Mapping out the goals of the access control list .............................................................................................256
Creating an access control list profile and enter configuration mode .............................................................257
Adding a filter rule to the current access control list profile ...........................................................................257
Adding an ICMP filter rule to the current access control list profile ..............................................................259
Adding a TCP, UDP or SCTP filter rule to the current access control list profile .........................................261
Binding and unbinding an access control list profile to an IP interface ..........................................................263
Displaying an access control list profile .........................................................................................................264
Debugging an access control list profile .........................................................................................................264
Examples .............................................................................................................................................................266
Denying a specific subnet ..............................................................................................................................266