Configuring all the use cases for ACL traffic filtering

You can configure all four use cases and apply them to a port by following these high level steps.

  1. Create an ACL, with criteria that matches the potential attack.
    • A standard ACL table provides the option to filter only based on source address information.
    • An extended ACL table provides the option to filter based on most of the fields in the packet header.
  2. Create a class map, and associate it to the ACL.
  3. Create a policy map using the class map created in step 2, and assign a policer.
  4. Associate the policy map to an ingress port.

Refer to Configuring all the use cases for ACL traffic filtering.