Administrator Guide

Table Of Contents
24 Contents
Preventing False ACL Matches . . . . . . . . . . 640
Using IP and MAC Address Masks
. . . . . . . . 641
Policy-Based Routing
. . . . . . . . . . . . . . . . . 643
Packet Classification
. . . . . . . . . . . . . . . 643
Route-Map Processing
. . . . . . . . . . . . . . 644
Route-Map Actions . . . . . . . . . . . . . . . . 645
Interface ACLs and PBR Interaction
. . . . . . . 647
PBR and Implicit Deny-all
. . . . . . . . . . . . . 648
Limitations. . . . . . . . . . . . . . . . . . . . . 648
Configuring ACLs (Web) . . . . . . . . . . . . . . . . 651
IP ACL Configuration
. . . . . . . . . . . . . . . 651
IP ACL Rule Configuration . . . . . . . . . . . . 653
MAC ACL Configuration. . . . . . . . . . . . . . 655
MAC ACL Rule Configuration . . . . . . . . . . . 657
IPv6 ACL Configuration . . . . . . . . . . . . . . 658
IPv6 ACL Rule Configuration
. . . . . . . . . . . 659
ACL Binding Configuration
. . . . . . . . . . . . 661
Time Range Entry Configuration
. . . . . . . . . 662
Configuring ACLs (CLI)
. . . . . . . . . . . . . . . . . 664
Configuring an IPv4 ACL
. . . . . . . . . . . . . 664
Configuring a MAC ACL
. . . . . . . . . . . . . . 670
Configuring an IPv6 ACL
. . . . . . . . . . . . . 674
Configuring a Time Range . . . . . . . . . . . . 677
ACL Configuration Examples
. . . . . . . . . . . . . . 679
Basic Rules
. . . . . . . . . . . . . . . . . . . . 679
Internal System ACLs
. . . . . . . . . . . . . . . 680
Complete ACL Example . . . . . . . . . . . . . . 681
Advanced Examples . . . . . . . . . . . . . . . 685
Policy-Based Routing Examples
. . . . . . . . . 697