Access Control List Entry Configuration Commands

This section details ACL commands used to configure deny or permit ACL entries, log, delete, insert, replace or move an ACL entry, or create an ACL comment entry. The commands used to configure named ACL entries are:

Note

Note

When applying an ACL to a non-host context on a 7100-Series device, the following restrictions apply:
  • Ranges are not allowed for UDP and TCP rules; the equal (eq) option is supported
  • The msg option is not supported for ICMP rules
Note

Note

The resources available for the configuration of ACL rules on the 7100-Series is based upon the system resource allocation profile configured using set limits resource-profile (7100-Series). See the release notes that come with your firmware for ACL resource limit details.