From: James Kilby (jamkilby@xxxxxxxxx)
Date: Thu Feb 08 2001 - 10:23:54 GMT-3
You first need to really understand what you need to do and where to apply
the filter (ie which interface/process - incoming/outgoing) - sounds
obvious, but thats where you're likely to fall in a hole when the results
aren't expected.
Next, try to pin down what you are filtering as exact as possible and
remember to permit everything else.
The most important part is where and how to apply the reference for the
access-list. This command will usually give you a clue as to which acl
numbers are applicable. i.e.#ip access-group ?
The rest is in the study! :-)
----- Original Message -----
From: Virnoche, Phil <phil.virnoche@attws.com>
To: CCIE newsgroup (E-mail) <ccielab@groupstudy.com>
Sent: Wednesday, February 07, 2001 6:26 PM
Subject: Access lists
> morning group-
>
> One of my weaknesses is creating access-lists. Does anyone have any
"tricks"
> or shortcuts or good practice references they would care to share?
>
> Philip G. Virnoche
> Network Engineer - AT&T Wireless
> phone: 425.580.5239
> cell: 206.601.3134
>
> "HAM AND EGGS - A day's work for a chicken; A lifetime commitment for a
> pig."
>
This archive was generated by hypermail 2.1.4 : Thu Jun 13 2002 - 10:28:41 GMT-3