Product guide
10-44
Access Control Lists (ACLs)
Configuring and Assigning an ACL
For example, figure 10-10 shows how to interpret the entries in a standard
ACL.
Figure 10-10. Example of a Displayed Standard ACL Configuration with Two ACEs
ProCurve(Config)# show running
.
.
.
ip access-list standard “Sample-List”
10 deny 10.28.150.77 0.0.0.0 log
20 permit 10.28.150.1 0.0.0.255
exit
ACL List Heading with List Type and
Identifier (Name or Number)
Mask
ACE Action
(permit or deny)
End-of-List Marker
Source IP Address
Optional Logging
Command