Print this page
Email this topic
Feedback
View PDF
Download EPUB
This section details L2 ACL commands used to configure deny or permit L2 ACL entries, log, delete, insert, replace, or move a L2 ACL entry, or create a L2 ACL comment entry. The commands used to configure named L2 ACL entries are: