Specifications
xxii
Displaying Multicast Receivers ...............................................................................................................14-7
Example............................................................................................................................................ 14-7
Chapter 15: Configuring and Managing Security ACLs
About Security Access Control Lists..............................................................................................................15-1
Overview of Security ACL Commands....................................................................................................15-1
Security ACL Filters ................................................................................................................................15-2
Order in Which ACLs are Applied to Traffic ............................................................................................15-3
Traffic Direction ................................................................................................................................ 15-3
Selection of User ACLs ...........................................................................................................................15-3
Creating and Committing a Security ACL......................................................................................................15-4
Setting a Source IP ACL .........................................................................................................................15-4
Examples..........................................................................................................................................15-4
Wildcard Masks ................................................................................................................................15-5
Class of Service................................................................................................................................15-5
Setting an ICMP ACL ..............................................................................................................................15-6
Example............................................................................................................................................ 15-6
Setting TCP and UDP ACLs ...................................................................................................................15-7
Setting a TCP ACL ........................................................................................................................... 15-8
Example .....................................................................................................................................15-8
Setting a UDP ACL........................................................................................................................... 15-8
Example .....................................................................................................................................15-8
Determining the ACE Order ....................................................................................................................15-9
Committing a Security ACL .....................................................................................................................15-9
Examples..........................................................................................................................................15-9
Viewing Security ACL Information...........................................................................................................15-9
Example............................................................................................................................................ 15-9
Viewing the Edit Buffer ...................................................................................................................15-10
Example ...................................................................................................................................15-10
Viewing Committed Security ACLs.................................................................................................15-10
Viewing Security ACL Details .........................................................................................................15-11
Examples .................................................................................................................................15-11
Displaying Security ACL Hits ..........................................................................................................15-11
Examples .................................................................................................................................15-11
Clearing Security ACLs .........................................................................................................................15-12
Examples........................................................................................................................................15-12
Mapping Security ACLs ...............................................................................................................................15-13
Mapping User-Based Security ACLs.....................................................................................................15-13
Example..........................................................................................................................................15-13
Mapping Security ACLs to VLANs, Virtual Ports, or Distributed APs....................................................15-14
Example..........................................................................................................................................15-14
Displaying ACL Maps to VLANs and Virtual Ports ................................................................................15-15
Example..........................................................................................................................................15-15
Clearing a Security ACL Map................................................................................................................15-15
Examples........................................................................................................................................15-15
Modifying a Security ACL ............................................................................................................................15-16
Adding Another ACE to a Security ACL ................................................................................................15-16
Example..........................................................................................................................................15-16
Placing One ACE before Another .........................................................................................................15-17
Example..........................................................................................................................................15-17
Modifying an Existing Security ACL ......................................................................................................15-18
Example........................................................................................................................
..................15-18