Chapter 1 8 Access Control Lists; Overview - Cisco ASR 5500 System Administration Manual

Hide thumbs Also See for ASR 5500:
Table of Contents

Advertisement

Access Control Lists
This chapter describes system support for access control lists and explains how they are configured. The
product administration guides provide examples and procedures for configuration of basic services on the
system. You should select the configuration example that best meets your service model before using the
procedures described below.
Important
Important
This chapter contains the following sections:

Overview

IP access lists, commonly known as access control lists (ACLs), control the flow of packets into and out of
the system. They are configured on a per-context basis and consist of "rules" (ACL rules) or filters that control
the action taken on packets that match the filter criteria. Once configured, an ACL can be applied to any of
the following:
• An individual interface
• All traffic facilitated by a context (known as a policy ACL)
• An individual subscriber
• All subscriber sessions facilitated by a specific context
You do not require a license to configure ACLs. However, the number of ACLs configured may impact
performance significantly.
Not all commands and keywords/variables may be available. Availability depends on the platform type.
Overview, page 183
Understanding ACLs, page 184
Configuring ACLs on the System, page 186
Applying IP ACLs, page 188
C H A P T E R
ASR 5500 System Administration Guide, StarOS Release 21.5
18
183

Advertisement

Table of Contents
loading

Table of Contents