First time I heard about VLAN Access Lists (VACLs) I was pretty intimidated. What's this access-list that can affect traffic at the L2 level? Must be pretty fancy, huh? Turns out not so fancy.   The problem:  Under normal operations, ACLs can only filter traffic at L3 (i.e. they have to be applied to an interface in a specific direction.   The solution:  VACLs use ACLs too, but they stand on the powerful shoulders of the Access-Map format (Route-Map-Looking statements).   Configuration Steps   Create an ACL  Create a VLAN access-map and specify an action  Apply the access-map to a SVI      Configuration commands:   ip access-list extended vacl_test  permit ip host 10.1.1.1 192.168.2.0 0.0.0.255  exit  !  vlan access-map vacl_test_map  match ip address list vact_test  action drop  vlan access-map vacl_test_map 20 (the 20's just a sequence number)  action forward  exit  !  vlan filter vacl_test_map vlan-list 1     Warning: Note that there may be a need to apply another ACL in the...
My journey in the world of Networking.