This chapter provides information and commands concerning the following topics:
The numbers assigned to the different types of access control lists (ACLs)
The use of wildcard masks in ACLs
The any and host keywords used by ACLs
How to create, apply, verify, and remove standard IP ACLs
How to create, apply, verify, and remove extended IP ACLs
How to create named ACLs
How to restrict virtual terminal access