IP access lists provide many benefits for securing a network and achieving nonsecurity goals, such as determining quality
of service (QoS) factors or limiting debug command output. This module describes how to create standard, extended, named, and numbered IP access lists. An access list
can be referenced by a name or a number. Standard access lists filter on only the source address in IP packets. Extended access
lists can filter on source address, destination address, and other fields in an IP packet.
After you create an access list, you must apply it to something in order for it to have any effect. This module describes
how to apply an access list to an interface. However, there are many other uses for access lists, which are mentioned in this
module and described in other modules and in other configuration guides for various technologies.
Finding Feature Information
Your software release may not support all the features that are documented in this module. For the latest feature information
and caveats, see the release notes for your platform and software release. The Feature Information Table at the end of this
document provides information about the documented features and lists the releases in which each feature is supported.