
Chapter 7 | Access control list configuration |
|
Chapter contents |
|
|
Introduction | 80 | |
About access control lists | 80 | |
What access lists do | 80 | |
Why you should configure access lists | 80 | |
When to configure access lists | 81 | |
Features of access control lists | 81 | |
Access control list configuration task list | 82 | |
Mapping out the goals of the access control list | 82 | |
Creating an access control list profile and enter configuration mode | 83 | |
Adding a filter rule to the current access control list profile | 83 | |
Adding an ICMP filter rule to the current access control list profile | 85 | |
Adding a TCP, UDP or SCTP filter rule to the current access control list profile | 87 | |
Binding and unbinding an access control list profile to an IP interface | 89 | |
Displaying an access control list profile | 90 | |
Debugging an access control list profile | 90 | |
Examples | 92 | |
Denying a specific subnet | 92 |
79