256 Configuring Device InformationThe following is an example of the CLI commands:ACL OverviewAccess Control Lists (ACL) allow network managers to define classification actions and rules for specificingress ports. Packets entering an ingress port, with an active ACL, are either admitted or denied entryand the ingress port is disabled. If they are denied entry, the user can disable the port.Defining IP based ACLsAccess Control Lists (ACL), which are comprised of Access Control Entries (ACE), allow networkmanagers to define classification actions and rules for specific ingress ports. Packets entering an ingressport, with an active ACL, are either admitted or denied entry and the ingress port is disabled. If they aredenied entry, the user can disable the port.For example, a network administrator defines an ACL rule that states, port number 20 can receiveTCP packets, however, if a UDP packet is received, the packet is dropped.ACLs are composed of access control entries (ACEs) that are made of the filters that determine trafficclassifications. Each ACE is a rule, and there are 1,024 rules available. But rules are not only used for userconfiguration purposes, they are also used for features like iSCSI and PVE, so not all 1,024 will beavailable for ACEs. It is expected that you will have at least 600 rules available.To define IP based ACLs, click Switch→ Network Security→ IP Based ACL. IConsole # show ports securityPort Status Action Trap Frequency Counter----- ------- ------- ------- --------- --------g7 Unlocked Discard Enable 100 88g8 Unlocked Discard,ShutdownDisableg3 Unlocked - - - -