Configuring all the use cases for ACL traffic filtering
You can configure all four use cases and
apply them to a port by following these high level steps.
- Create an ACL, with criteria that matches the potential attack.
- A standard ACL table provides the option to filter only based on source address information.
- An extended ACL table provides the option to filter based on most of the fields in the packet header.
- Create a class map, and associate it to the ACL.
- Create a policy map using the class map created in
step 2, and assign a policer.
- Associate the policy map to an ingress port.
Refer to
Configuring all the use cases for ACL traffic filtering.