beautypg.com

Chapter 7 access control list configuration, Access control list configuration, Chapter 7 – Patton electronic ONSITE 2800 User Manual

Page 79: Chapter

background image

79

Chapter 7

Access control list configuration

Chapter contents

Introduction

..........................................................................................................................................................80

About access control lists

.......................................................................................................................................80

What access lists do

.........................................................................................................................................80

Why you should configure access lists

.............................................................................................................80

When to configure access lists

.........................................................................................................................81

Features of access control lists

.........................................................................................................................81

Access control list configuration task list

................................................................................................................82

Mapping out the goals of the access control list

...............................................................................................82

Creating an access control list profile and enter configuration mode

...............................................................83

Adding a filter rule to the current access control list profile

.............................................................................83

Adding an ICMP filter rule to the current access control list profile

................................................................85

Adding a TCP, UDP or SCTP filter rule to the current access control list profile

...........................................87

Binding and unbinding an access control list profile to an IP interface

............................................................89

Displaying an access control list profile

...........................................................................................................90

Debugging an access control list profile

...........................................................................................................90

Examples

...............................................................................................................................................................92

Denying a specific subnet

................................................................................................................................92