xiv
C O N T E N T S
Precedence Numbers.............................................. 312
Specifying a Default Rule ........................................ 312
The Permit-Established Keyword ............................ 313
Adding and Deleting Access List Entries................. 314
Maximum Entries..................................................... 314
Access Lists for ICMP .................................................314
Security and Access Policies................................... 315
Verifying Access List Configurations ....................... 315
Access List Commands ..............................................315
IP Access List Examples ............................................320
Example 1: Using the Permit-Established Keyword 320
Step 1 – Deny IP Traffic ..........................................320
Step 2 – Allow TCP Traffic ......................................321
Step 3 - Permit-Established Access List ..................322
Example 2: Filtering ICMP Packets ......................... 323
Using Routing Access Policies ..................................323
Creating an Access Profile ...................................... 324
Configuring an Access Profile Mode ....................... 324
Adding an Access Profile Entry ............................... 325
Specifying Subnet Masks ........................................325
Sequence Numbering ..............................................326
Permit and Deny Entries ..........................................326
Autonomous System Expressions ...........................326
Deleting an Access Profile Entry .............................327
Applying Access Profiles ......................................... 327
Routing Access Policies for RIP .............................. 327
Examples ................................................................. 328
Routing Access Policies for OSPF .......................... 329
OSPF Access Policy Example .................................330
Routing Access Policies for DVMRP ....................... 331
DVMRP Example .....................................................332
Routing Access Policies for PIM.............................. 332
PIM Example ...........................................................333
Routing Access Policies for BGP ............................ 333
Making Changes to a Routing Access Policy ...........334
Removing a Routing Access Policy ..........................334
Routing Access Policy Commands ...........................335
Using Route Maps ....................................................... 337
Creating a Route Map ............................................. 338
Add Entries to the Route Map ................................. 338
Add Statements to the Route Map Entries .............. 338