Sequential comparison and action................................................................................... 213
Implicit Deny.....................................................................................................................213
Planning an ACL application..................................................................................................................215
IPv4 traffic management and improved network performance....................................................215
Security....................................................................................................................................... 215
Guidelines for planning the structure of a static ACL.................................................................. 216
IPv4 ACL configuration and operating rules................................................................................216
How an ACE uses a mask to screen packets for matches......................................................... 217
What Is the difference between network (or subnet) masks and the masks used with
ACLs?...............................................................................................................................217
Rules for defining a match between a packet and an ACE.............................................. 218
Configuring and assigning an IPv4 ACL................................................................................................ 222
General steps for implementing ACLs........................................................................................ 222
Options for permit/deny policies..................................................................................................222
ACL configuration structure.........................................................................................................222
Standard ACL structure....................................................................................................223
Extended ACL configuration structure..............................................................................224
ACL configuration factors............................................................................................................226
The sequence of entries in an ACL is significant............................................................. 226
Allowing for the Implied Deny function............................................................................. 228
A configured ACL has no effect until you apply it to an interface..................................... 228
You can assign an ACL name or number to an interface even if the ACL does not
exist in the switch configuration........................................................................................228
Using the CLI to create an ACL.................................................................................................. 228
Inserting or adding an ACE to an ACL............................................................................. 228
Using CIDR notation to enter the IPv4 ACL mask............................................................229
Configuring standard ACLs....................................................................................................................230
Configuring named, standard ACLs............................................................................................ 230
Entering the IPv4 named ACL context............................................................................. 230
Configuring ACEs in a named, standard ACL.................................................................. 231
Creating numbered, standard ACLs.................................................................................232
Configuring extended ACLs................................................................................................................... 234
Configuring named, extended ACLs........................................................................................... 234
Configuring ACEs in named, extended ACLs............................................................................. 235
Including options for TCP and UDP traffic in extended ACLs..................................................... 237
Configuring numbered, extended ACLs...................................................................................... 238
Creating or adding to an extended, numbered ACL.........................................................238
Controlling TCP and UDP traffic flow............................................................................... 241
Adding or removing an ACL assignment on an interface.......................................................................241
Filtering IPv4 traffic inbound on a VLAN..................................................................................... 241
Filtering inbound IPv4 traffic per port.......................................................................................... 242
Deleting an ACL.....................................................................................................................................243
Editing an existing ACL..........................................................................................................................243
Using the CLI to edit ACLs..........................................................................................................244
General editing rules................................................................................................................... 244
Sequence numbering in ACLs.................................................................................................... 244
Inserting an ACE in an existing ACL................................................................................ 245
Deleting an ACE from an existing ACL............................................................................ 246
Resequencing the ACEs in an ACL................................................................................. 247
Attaching a remark to an ACE..........................................................................................248
Operating notes for remarks.............................................................................................250
Viewing ACL configuration data.............................................................................................................251
Viewing an ACL summary...........................................................................................................251
Viewing the content of all ACLs on the switch.............................................................................252
Viewing the VACL assignments for a VLAN................................................................................253
Viewing static port (and trunk) ACL assignments........................................................................254
Viewing specific ACL configuration details..................................................................................254
Contents 9