Cisco PIX 525 Spezifikationen Seite 203

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 604
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 202
CHAPTER
13-1
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
13
Identifying Traffic with Access Lists
This chapter describes how to identify traffic with access lists.
This chapter includes the following topics:
Access List Overview, page 13-1
Adding an Extended Access List, page 13-9
Adding an EtherType Access List, page 13-11
Adding a Standard Access List, page 13-13
Simplifying Access Lists with Object Grouping, page 13-13
Adding Remarks to Access Lists, page 13-20
Time Range Options, page 13-20
Logging Access List Activity, page 13-20
For information about IPv6 access lists, see the “Configuring IPv6 Access Lists” section on page 9-4.
Access List Overview
Access lists are made up of one or more Access Control Entries. An ACE is a single entry in an access
list that specifies a permit or deny rule, and is applied to a protocol, a source and destination IP address
or network, and optionally the source and destination ports.
Access lists are used in a variety of features. If your feature uses Modular Policy Framework, you can
use an access list to identify traffic within a traffic class map. For more information on Modular Policy
Framework, see Chapter 18, “Using Modular Policy Framework.”
This section includes the following topics:
Access List Types and Uses, page 13-2
Access List Guidelines, page 13-6
Seitenansicht 202
1 2 ... 198 199 200 201 202 203 204 205 206 207 208 ... 603 604

Kommentare zu diesen Handbüchern

Keine Kommentare