5 In the ACL Name box, type the name for the ACL (1 to 32 alphanumeric
characters, with no spaces or tabs). The name can include hyphens (-),
underscores (_), or periods (.). ACL names are case-sensitive and must
begin with a letter. Do not include any of the following terms in the
name: all, default-action, map, help, editbuffer.
6 Go to "Defining Access Control Entries".
Defining Access Control Entries
As part of defining ACL properties, you need to define access control
entries (ACEs) for the ACL. You can add the following types of ACEs to an
ACL:
IP — Filters packets by source and destination IP addresses, type of
service (TOS), or precedence. For more information, see "Creating an
IP ACE" on page 350.
TCP — Filters packets by established TCP connections, source and
destination IP addresses, TOS, precedence, or TCP source and
destination ports. For more information, see "Creating a TCP or UDP
ACE" on page 352.
Using Access Control Lists for Security
349