Defining ACLs
Although you can create an ACL for many types of protocols that you might want to filter, you are only going to concentrate on IP ACLs in this chapter. For a complete explanation of ACLs that are used by other protocols, refer to either the Cisco IOS Security Configuration Guide for your appropriate IOS level or Configuring Network Security with ACLs for your appropriate 3550 software release.
Your first consideration when creating an ACL is to decide whether the ACL is to be applied to inbound traffic or outbound traffic. The direction is referenced as to whether the packet is entering or exiting an interface.
When creating your ACL, you are defining logically ordered ACEs that comprise the ACL. The ACEs are what your device uses ...
Get CCIE Practical Studies: Security (CCIE Self-Study) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.