Users Guide

Table Of Contents
For example, if you configured the following rules:
deny ip 1.1.1.1/24 2.2.2.2/24
deny ip any any
Using the no deny ip any any command deletes only the deny ip any any rule.
To delete the deny ip 1.1.1.1/24 2.2.2.2/24 rule, you must explicitly use the no deny ip 1.1.1.1/24
2.2.2.2/24 command.
NOTE: Wildcard option is not supported.
You can no longer configure the same ACL rule multiple times using different sequence numbers. This option prevents
duplicate rules from being entered in the system and taking up memory space.
When you upgrade from a previous release to release 10.4.2 or later, the upgrade procedure removes all duplicate ACL rules
and only one instance of an ACL rule remains in the system.
L2 and L3 ACLs
Configure both L2 and L3 ACLs on an interface in L2 mode. Rules apply if you use both L2 and L3 ACLs on an interface.
L3 ACL filters packets and then the L2 ACL filters packets
Egress L3 ACL filters packets
Rules apply in order:
Ingress L3 ACL
Ingress L2 ACL
Egress L3 ACL
Egress L2 ACL
NOTE: In ingress ACLs, L2 has a higher priority than L3 and in egress ACLs, L3 has a higher priority than L2.
Table 132. L2 and L3 targeted traffic
L2 ACL / L3 ACL Targeted traffic
Deny / Deny L3 ACL denies
Deny / Permit L3 ACL permits
Permit / Deny L3 ACL denies
Permit / Permit L3 ACL permits
Assign and apply ACL filters
To filter an Ethernet interface, a port-channel interface, or a VLAN, assign an IP ACL filter to the corresponding interface. The
IP ACL applies to all traffic entering a physical, port-channel, or VLAN interface. The traffic either forwards or drops depending
on the criteria and actions you configure in the ACL filter.
To change the ACL filter functionality, apply the same ACL filters to different interfaces. For example, take ACL ABCD and
apply it using the in keyword and it becomes an ingress ACL. If you apply the same ACL filter using the out keyword, it
becomes an egress ACL.
NOTE:
This note is applicable only for the S5200F-ON series platform switches. Applying an egress ACL to a VLAN
interface with access ports as members (untagged) has no effect. The system does not apply egress ACL rules on
untagged access ports.
You can apply an IP ACL filter to a physical, port-channel, or VLAN interface. The number of ACL filters allowed is hardware-
dependent.
1. Enter the interface information in CONFIGURATION mode.
interface ethernet node/slot/port
1444
Access Control Lists