ACL Configuration Examples
ACL Example 1
1. Configure an Access Control List.
2. Add ACL 1 to port 1.
ACL Example 2
1. Configure an Access Control List.
2. Add ACL 2 to port 2.
© Copyright Lenovo 2016
This section contains examples of access control list configuration.
Use this configuration to block traffic to a specific host. All traffic that ingresses on
port 1 is denied if it is destined for the host at IP address 100.10.1.1
RS G8264(config)# accesscontrol list 1 ipv4 destinationipaddress
100.10.1.1
RS G8264(config)# accesscontrol list 1 action deny
RS G8264(config)# interface port 1
RS G8264(configif)# accesscontrol list 1
RS G8264(configif)# exit
Use this configuration to block traffic from a network destined for a specific host
address. All traffic that ingresses in port 2 with source IP from class 100.10.1.0/24
and destination IP 200.20.2.2 is denied.
RS G8264(config)# accesscontrol list 2 ipv4 sourceipaddress 100.10.1.0
255.255.255.0
RS G8264(config)# accesscontrol list 2 ipv4 destinationipaddress
200.20.2.2 255.255.255.255
RS G8264(config)# accesscontrol list 2 action deny
RS G8264(config)# interface port 2
RS G8264(configif)# accesscontrol list 2
RS G8264(configif)# exit
Chapter 7: Access Control Lists
133