Users Guide

Contents 23
19 Access Control Lists . . . . . . . . . . . . . . . 663
ACL Overview . . . . . . . . . . . . . . . . . . . . . . 663
ACL Counters
. . . . . . . . . . . . . . . . . . . . 665
What Are MAC ACLs?
. . . . . . . . . . . . . . . 665
What Are IP ACLs?
. . . . . . . . . . . . . . . . . 666
ACL Actions
. . . . . . . . . . . . . . . . . . . . . 666
What Is the ACL Redirect Function?
. . . . . . . . 667
What Is the ACL Mirror Function?
. . . . . . . . . 668
What Is ACL Logging
. . . . . . . . . . . . . . . . 668
What Are Time-Based ACLs?
. . . . . . . . . . . 668
ACL Limitations
. . . . . . . . . . . . . . . . . . . 669
ACL Configuration Details
. . . . . . . . . . . . . . . . 674
How Are ACLs Configured?
. . . . . . . . . . . . . 674
Editing Access Lists
. . . . . . . . . . . . . . . . 674
Preventing False ACL Matches
. . . . . . . . . . . 674
Using IP and MAC Address Masks
. . . . . . . . . 676
Policy-Based Routing
. . . . . . . . . . . . . . . . . . 677
Packet Classification
. . . . . . . . . . . . . . . . 677
Route-Map Processing
. . . . . . . . . . . . . . . 678
Route-Map Actions
. . . . . . . . . . . . . . . . . 679
ACLs and Policy Interaction
. . . . . . . . . . . . 681
Limitations
. . . . . . . . . . . . . . . . . . . . . 682
Configuring ACLs (Web)
. . . . . . . . . . . . . . . . . 685
IP ACL Configuration
. . . . . . . . . . . . . . . . 685
IP ACL Rule Configuration
. . . . . . . . . . . . . 688
MAC ACL Configuration
. . . . . . . . . . . . . . 690
MAC ACL Rule Configuration
. . . . . . . . . . . . 692
IPv6 ACL Configuration
. . . . . . . . . . . . . . . 693
IPv6 ACL Rule Configuration
. . . . . . . . . . . . 694
ACL Binding Configuration
. . . . . . . . . . . . . 696
Time Range Configuration
. . . . . . . . . . . . . 697