This chapter describes how to apply access lists to traffic routed between VRFs set of commands and how to use them on the S- and K-Series platforms. For information about configuring VRF ACLs, refer to S- and K-Series L3 and L2 Access Control List Configuration in the S-, K-, and 7100 Series Configuration Guide.