Configuration Examples for ACLs
This section provides ACL configuration examples.
Example for Configuring a Basic ACL to Manage Device Access Rights
This section provides an example for configuring a basic ACL to manage device access rights.
Example for Configuring an Advanced ACL to Defend Against Attacks
This section provides an example for configuring an advanced ACL to defend against attacks.
Example for Using Advanced ACLs to Prevent User Hosts on Different Network Segments from Communicating