This section details ACL commands used to configure deny or permit ACL entries, log, delete, insert, replace or move an ACL entry, or create an ACL comment entry. The commands used to configure named ACL entries are:
Note
When applying an ACL to a non-host context on a 7100-Series device, the following restrictions apply:Note
The resources available for the configuration of ACL rules on the 7100-Series is based upon the system resource allocation profile configured using set limits resource-profile (7100-Series). See the release notes that come with your firmware for ACL resource limit details.