Introduction
Feature
Numbered ACLs
Standard ACLs
Extended ACLs
Named ACLs
Enable or Disable an ACL
Display ACL Data
Delete an ACL
Configure an ACL from a TFTP Server
Enable ACL Logging
Show ACL Resources
Access-List Resources Help
ACL Applications
ACLs can filter traffic from a host, a group of hosts, or from entire subnets.
Where it is necessary to apply ACLs to filter traffic from outside a network or
subnet, applying ACLs at the edge of the network or subnet removes unwanted
traffic as soon as possible, and thus helps to improve system performance.
ACLs filter inbound traffic only and can rapidly consume switch resources.
For these reasons, the best places to apply ACLs are on "edge" ports where
ACLs are likely to be less complex and resource-intensive.
Optional Network Management Applications
ACLs through a RADIUS server can also be augmented using the Identity-
Driven Management (IDM) application available for use with PCM. However,
the features described in this chapter can be used without PCM or IDM
support, if desired.
For information on configuring client authentication on the switch, refer to
chapter 5, "RADIUS Authentication and Accounting".
Access Control Lists (ACLs)
Default
Menu
None
—
None
—
—
—
n/a
—
n/a
—
n/a
—
n/a
—
n/a
—
n/a
—
Introduction
CLI
Web
9-39
—
9-44
—
9-50
—
9-52
—
9-54
—
9-53
—
9-63
—
9-68
—
9-19
—
9-18
—
9-3
Need help?
Do you have a question about the 2610 and is the answer not in the manual?
Questions and answers