First time I heard about VLAN Access Lists (VACLs) I was pretty intimidated. What's this access-list that can affect traffic at the L2 level? Must be pretty fancy, huh? Turns out not so fancy. The problem: Under normal operations, ACLs can only filter traffic at L3 (i.e. they have to be applied to an interface in a specific direction. The solution: VACLs use ACLs too, but they stand on the powerful shoulders of the Access-Map format (Route-Map-Looking statements). Configuration Steps Create an ACL Create a VLAN access-map and specify an action Apply the access-map to a SVI Configuration commands: ip access-list extended vacl_test permit ip host 10.1.1.1 192.168.2.0 0.0.0.255 exit ! vlan access-map vacl_test_map match ip address list vact_test action drop vlan access-map vacl_test_map 20 (the 20's just a sequence number) action forward exit ! vlan filter vacl_test_map vlan-list 1 Warning: Note that there may be a need to apply another ACL in the
My journey in the world of Networking.