Access Security Guide K/KA/KB.15.15

10 IPv4 Access Control Lists (ACLs)..............................................................259
Configuring.........................................................................................................................259
Configuring named, standard ACLs....................................................................................259
Entering the IPv4 named ACL context.............................................................................259
Configuring ACEs in a named, standard ACL..................................................................259
Deleting an ACE.........................................................................................................261
Creating or adding to a standard, numbered ACL...........................................................261
Creating and viewing a standard ACL.......................................................................262
Configuring extended ACLs...............................................................................................263
Creating and configuring a named, extended ACL..........................................................263
Configuring ACEs in named, extended ACLs...................................................................264
Including options for TCP and UDP traffic in extended ACLs..............................................267
Controlling ICMP traffic in extended ACLs......................................................................269
Controlling IGMP traffic in extended ACLs......................................................................270
Configuring numbered, extended ACLs...............................................................................271
Creating or adding to an extended, numbered ACL.........................................................271
Controlling TCP and UDP traffic flow..............................................................................274
Controlling ICMP traffic flow.........................................................................................275
Controlling IGMP traffic flow.........................................................................................275
Configuring logging timer.................................................................................................275
Viewing...............................................................................................................................276
Viewing an ACL summary.................................................................................................276
Viewing the content of all ACLs on the switch.......................................................................276
Viewing the RACL and VACL assignments for a VLAN...........................................................277
Viewing static port (and trunk) ACL assignments...................................................................278
Viewing specific ACL configuration details...........................................................................278
Viewing all ACLs and their assignments in the routing switch startup-config and running-config
files................................................................................................................................281
Using..................................................................................................................................281
Adding or removing an ACL assignment on an interface.......................................................281
Filtering routed IPv4 traffic............................................................................................281
Filtering IPv4 traffic inbound on a VLAN.........................................................................282
Filtering inbound IPv4 traffic per port.............................................................................282
Classifier-based rate-limiting with RL-PACLs......................................................................283
Creating ACLs.................................................................................................................283
Using the CLI to create an ACL......................................................................................283
Inserting or adding an ACE to an ACL......................................................................283
Deleting an ACE....................................................................................................284
Duplicating an ACE................................................................................................284
Creating or editing an ACL offline.................................................................................284
Deleting an ACL..............................................................................................................288
Inserting an ACE in an existing ACL...................................................................................288
Deleting an ACE from an existing ACL................................................................................289
Resequencing the ACEs in an ACL......................................................................................290
Attaching a remark to an ACE...........................................................................................291
Appending remarks and related ACEs to the end of an ACL..................................................292
Inserting remarks and related ACEs within an existing list......................................................292
Inserting a remark for an ACE that already exists in an ACL..................................................293
Removing a remark from an existing ACE............................................................................293
Enable ACL “Deny or “Permit Logging.............................................................................293
Requirements for using ACL Logging...................................................................................293
ACL Logging Operation....................................................................................................293
Enabling ACL logging on the switch...................................................................................294
Monitoring static ACL performance....................................................................................295
12 Contents