27
ACL C
ONFIGURATION
ACL Overview
The Switch 4210 supports software-based ACLs for the purpose of controlling
management access into the Switch 4210 from Telnet and SNMP management
stations. As the network scale and network traffic are increasingly growing,
security control and bandwidth assignment play a more and more important role
in network management. Filtering data packets can prevent a network from being
accessed by unauthorized users efficiently while controlling network traffic and
saving network resources. Access control lists (ACL) are often used to filter packets
with configured matching rules.
Upon receiving a packet, the switch compares the packet with the rules of the
ACL applied on the current port to permit or discard the packet.
The rules of an ACL can be referenced by other functions that need traffic
classification, such as QoS.
ACLs classify packets using a series of conditions known as rules. The conditions
can be based on source addresses, destination addresses and port numbers carried
in the packets.
According to their application purposes, ACLs fall into the following four types.
■
Basic ACL. Rules are created based on source IP addresses only.
■
Advanced ACL. Rules are created based on the Layer 3 and Layer 4 information
such as the source and destination IP addresses, type of the protocols carried
by IP, protocol-specific features, and so on.
■
Layer 2 ACL. Rules are created based on the Layer 2 information such as source
and destination MAC addresses, VLAN priorities, type of Layer 2 protocol, and
so on.
■
User-defined ACL. An ACL of this type matches packets by comparing the
strings retrieved from the packets with specified strings. It defines the byte it
begins to perform "and" operation with the mask on the basis of packet
headers.
ACL Matching Order
An ACL can contain multiple rules, each of which matches specific type of
packets. So the order in which the rules of an ACL are matched needs to be
determined.
The rules in an ACL can be matched in one of the following two ways:
■
config
: where rules in an ACL are matched in the order defined by the user.
■
auto
: where rules in an ACL are matched in the order determined by the
system, namely the "depth-first" rule.
Summary of Contents for Switch 4210 9-Port
Page 22: ...20 CHAPTER 1 CLI CONFIGURATION ...
Page 74: ...72 CHAPTER 3 CONFIGURATION FILE MANAGEMENT ...
Page 84: ...82 CHAPTER 5 VLAN CONFIGURATION ...
Page 96: ...94 CHAPTER 8 IP PERFORMANCE CONFIGURATION ...
Page 108: ...106 CHAPTER 9 PORT BASIC CONFIGURATION ...
Page 122: ...120 CHAPTER 11 PORT ISOLATION CONFIGURATION ...
Page 140: ...138 CHAPTER 13 MAC ADDRESS TABLE MANAGEMENT ...
Page 234: ...232 CHAPTER 17 802 1X CONFIGURATION ...
Page 246: ...244 CHAPTER 20 AAA OVERVIEW ...
Page 270: ...268 CHAPTER 21 AAA CONFIGURATION ...
Page 292: ...290 CHAPTER 26 DHCP BOOTP CLIENT CONFIGURATION ...
Page 318: ...316 CHAPTER 29 MIRRORING CONFIGURATION ...
Page 340: ...338 CHAPTER 30 CLUSTER ...
Page 362: ...360 CHAPTER 33 SNMP CONFIGURATION ...
Page 368: ...366 CHAPTER 34 RMON CONFIGURATION ...
Page 450: ...448 CHAPTER 39 TFTP CONFIGURATION ...
Page 451: ......
Page 452: ...450 CHAPTER 39 TFTP CONFIGURATION ...
Page 470: ...468 CHAPTER 40 INFORMATION CENTER ...
Page 496: ...494 CHAPTER 44 DEVICE MANAGEMENT ...