Access Control List Entry Configuration Commands

This section details L2 ACL commands used to configure deny or permit L2 ACL entries, log, delete, insert, replace, or move a L2 ACL entry, or create a L2 ACL comment entry. The commands used to configure named L2 ACL entries are: