Users Guide

Table Of Contents
24 Contents
What Are MAC ACLs? . . . . . . . . . . . . . . . 705
What Are IP ACLs?
. . . . . . . . . . . . . . . . . 706
ACL Actions
. . . . . . . . . . . . . . . . . . . . . 706
What Is the ACL Redirect Function?
. . . . . . . . 707
What Is the ACL Mirror Function?
. . . . . . . . . 708
What Is ACL Logging
. . . . . . . . . . . . . . . . 708
What Are Time-Based ACLs?
. . . . . . . . . . . . 708
ACL Limitations
. . . . . . . . . . . . . . . . . . . 709
ACL Configuration Details
. . . . . . . . . . . . . . . . 714
How Are ACLs Configured?
. . . . . . . . . . . . . 714
Editing Access Lists
. . . . . . . . . . . . . . . . . 714
Preventing False ACL Matches
. . . . . . . . . . . 714
Using IP and MAC Address Masks
. . . . . . . . . 716
Policy-Based Routing
. . . . . . . . . . . . . . . . . . 717
Packet Classification
. . . . . . . . . . . . . . . . 717
Route-Map Processing
. . . . . . . . . . . . . . . 718
Route-Map Actions
. . . . . . . . . . . . . . . . . 719
ACLs and Policy Interaction
. . . . . . . . . . . . 721
Limitations
. . . . . . . . . . . . . . . . . . . . . . 722
Configuring ACLs (Web)
. . . . . . . . . . . . . . . . . 725
IP ACL Configuration
. . . . . . . . . . . . . . . . 725
IP ACL Rule Configuration
. . . . . . . . . . . . . 728
MAC ACL Configuration
. . . . . . . . . . . . . . . 730
MAC ACL Rule Configuration
. . . . . . . . . . . . 732
IPv6 ACL Configuration
. . . . . . . . . . . . . . . 733
IPv6 ACL Rule Configuration
. . . . . . . . . . . . 734
ACL Binding Configuration
. . . . . . . . . . . . . 736
Time Range Configuration
. . . . . . . . . . . . . 737
Configuring ACLs (CLI)
. . . . . . . . . . . . . . . . . . 739
Configuring an IPv4 ACL
. . . . . . . . . . . . . . 739
Configuring a MAC ACL
. . . . . . . . . . . . . . . 745