1-17ACL Configuration ExamplesIPv4 ACL Application Configuration ExampleNetwork requirementsAs shown in Figure 1-1, apply an ACL to the inbound direction of interface GigabitEthernet 1/0/1 onDevice A so that everyday from 8:00 to 18:00, the interface allows only packets sourced from Host A topass. Configure Device A to output IPv4 packet filtering logs to the console at an interval of 10 minutes.Figure 1-1 Network diagram for applying an IPv4 ACL to an interface for packet filteringConfiguration procedure# Create a time range from 08:00 to 18:00 everyday. system-view[DeviceA] time-range study 8:00 to 18:00 daily# Create IPv4 ACL 2009, and configure two rules in the ACL. One permits packets sourced from HostA at 192.168.1.2 and the other denies packets sourced from any other host during the time rangestudy. Enable logging for both rules.[DeviceA] acl number 2009[DeviceA-acl-basic-2009] rule permit source 192.168.1.2 0 time-range study logging[DeviceA-acl-basic-2009] rule deny source any time-range study logging[DeviceA-acl-basic-2009] quit# Apply IPv4 ACL 2009 to filter incoming packets on GigabitEthernet 1/0/1.[DeviceA] interface GigabitEthernet 1/0/1[DeviceA-GigabitEthernet1/0/1] packet-filter 2009 inbound[DeviceA-GigabitEthernet1/0/1] quit# Enable the device to generate and output IPv4 packet filtering logs at 10-minute intervals.[DeviceA] acl logging frequence 10# Configure the device to output informational log messages to the console.[DeviceA] info-center source default channel 0 log level informationalIPv6 ACL Application Configuration ExampleNetwork requirementsAs shown in Figure 1-2, apply an IPv6 ACL to the incoming traffic of GigabitEthernet 1/0/1 on Device A,so that everyday from 8:00 to 18:00, the interface allows only packets from Host A to pass through.Configure Device A to output IPv4 packet filtering logs to the console at an interval of 10 minutes.