Chapter 7 access control list configuration, Access control list configuration, Chapter 7 – Patton electronic ONSITE 2800 User Manual
Page 79: Chapter

79
Chapter 7
Access control list configuration
Chapter contents
..........................................................................................................................................................80
.......................................................................................................................................80
.........................................................................................................................................80
Why you should configure access lists
.............................................................................................................80
When to configure access lists
.........................................................................................................................81
Features of access control lists
.........................................................................................................................81
Access control list configuration task list
................................................................................................................82
Mapping out the goals of the access control list
...............................................................................................82
Creating an access control list profile and enter configuration mode
...............................................................83
Adding a filter rule to the current access control list profile
.............................................................................83
Adding an ICMP filter rule to the current access control list profile
................................................................85
Adding a TCP, UDP or SCTP filter rule to the current access control list profile
...........................................87
Binding and unbinding an access control list profile to an IP interface
............................................................89
Displaying an access control list profile
...........................................................................................................90
Debugging an access control list profile
...........................................................................................................90
...............................................................................................................................................................92
................................................................................................................................92