Patton electronic 2800 Network Router User Manual


 
79
Chapter 7 Access control list configuration
Chapter contents
Introduction..........................................................................................................................................................80
About access control lists .......................................................................................................................................80
What access lists do .........................................................................................................................................80
Why you should configure access lists .............................................................................................................80
When to configure access lists .........................................................................................................................81
Features of access control lists .........................................................................................................................81
Access control list configuration task list................................................................................................................82
Mapping out the goals of the access control list ...............................................................................................82
Creating an access control list profile and enter configuration mode ...............................................................83
Adding a filter rule to the current access control list profile .............................................................................83
Adding an ICMP filter rule to the current access control list profile ................................................................85
Adding a TCP, UDP or SCTP filter rule to the current access control list profile ...........................................87
Binding and unbinding an access control list profile to an IP interface ............................................................89
Displaying an access control list profile ...........................................................................................................90
Debugging an access control list profile ...........................................................................................................90
Examples...............................................................................................................................................................92
Denying a specific subnet ................................................................................................................................92