C H A P T E R
18
Access Control Lists
This chapter describes system support for access control lists and explains how they are configured. The
product administration guides provide examples and procedures for configuration of basic services on the
system. You should select the configuration example that best meets your service model before using the
procedures described below.
You do not require a license to configure ACLs. However, the number of ACLs configured may impact
performance significantly.
Important
Not all commands and keywords/variables may be available. Availability depends on the platform type.
Important
This chapter contains the following sections:
•
•
•
Configuring ACLs on the System, page 186
•
Overview
IP access lists, commonly known as access control lists (ACLs), control the flow of packets into and out of
the system. They are configured on a per-context basis and consist of "rules" (ACL rules) or filters that control
the action taken on packets that match the filter criteria. Once configured, an ACL can be applied to any of
the following:
•
An individual interface
•
All traffic facilitated by a context (known as a policy ACL)
•
An individual subscriber
•
All subscriber sessions facilitated by a specific context
ASR 5500 System Administration Guide, StarOS Release 21.5
183