The same ACL may be applied to different interfaces and that changes its functionality. For example, you can take ACL “ABCD” and apply itusing the in keyword and it becomes an ingress access list. If you apply the same ACL using the out keyword, it becomes an egressaccess list. If you apply the same ACL to the Loopback interface, it becomes a Loopback access list.This section describes the following:• Configure Ingress ACLs• Configure Egress ACLsFor more information about Layer-3 interfaces, refer to Interfaces.Applying an IP ACLTo apply an IP ACL (standard or extended) to a physical or port channel interface, use the following commands.1 Enter the interface number.CONFIGURATION modeinterface interface slot/port2 Configure an IP address for the interface, placing it in Layer-3 mode.INTERFACE modeip address ip-address3 Apply an IP ACL to traffic entering or exiting an interface.INTERFACE modeip access-group access-list-name {in} [implicit-permit] [vlan vlan-range | vrf vrf-range]NOTE: The number of entries allowed per ACL is hardware-dependent. For detailed specification about entries allowedper ACL, refer to your line card documentation.4 Apply rules to the new ACL.INTERFACE modeip access-list [standard | extended] nameTo view which IP ACL is applied to an interface, use the show config command in INTERFACE mode, or use the show running-config command in EXEC mode.Example of Viewing ACLs Applied to an InterfaceDell(conf-if)#show conf!interface TenGigabitEthernet 1/1/1/1ip address 10.2.1.100 255.255.255.0ip access-group nimule inno shutdownDell(conf-if)#To filter traffic on Telnet sessions, use only standard ACLs in the access-class command.Counting ACL HitsYou can view the number of packets matching the ACL by using the count option when creating ACL entries.1 Create an ACL that uses rules with the count option. Refer to Configure a Standard IP ACL Filter.2 Apply the ACL as an inbound or outbound ACL on an interface.3 show ip accounting access-listAccess Control Lists (ACLs) 119