AT-9000 Switch Command Line User’s Guide
Section X: Network Management
1025
ID Numbers
For both Numbered IPv4 ACLs and Numbered MAC ACLs, you must
assign each ACL an unique ID number. There are two ID number ranges
that are displayed in Table 106.
How Ingress
Packets are
Compared
Against ACLs
As stated previously, ports that do not have an ACL forward
all
ingress
packets. Ports with one or more deny ACLs discard ingress packets that
match the ACLs and forward all other traffic. A port that has one ACL that
specifies a particular source IP address, for example, discards all ingress
packets with the specified source address and forwards all other traffic. In
situations where a port has more than one deny ACL, packets are
discarded at the first match.
Since ports forward all ingress packets unless they have deny ACLs,
permit ACLs are only necessary in situations where you want a port to
forward packets that are a subset of a larger traffic flow that is blocked. For
example, a port that forwards only packets having a specified destination
IP address. A permit ACL specifies the packets with the intended
destination IP address and a deny ACL specifies all traffic.
When ports have both permit and deny ACLs, you must add the permit
ACLs first, because packets are compared against the ACLs in the order
they are added to the ports. If a permit ACL is added after a deny ACL,
ports are likely to discard packets specified by the permit ACL, thus
causing them to block packets you want them to forward. This concept is
illustrated in the examples in this chapter.
Table 106. Access Control List ID Number Ranges
Type of ACL
ID Number Range
Numbered IPv4 ACLs
3000 - 3699
Numbered MAC ACLs
4000 - 4699
Summary of Contents for AT-9000/28
Page 4: ......
Page 26: ...Contents 26...
Page 30: ...Tables 30...
Page 36: ...36 Section I Getting Started...
Page 70: ...Chapter 2 Starting a Management Session 70 Section I Getting Started...
Page 96: ...96 Section II Basic Operations...
Page 142: ...Chapter 6 Basic Switch Management Commands 142 Section II Basic Operations...
Page 220: ...Chapter 9 IPv4 and IPv6 Management Addresses 220 Section II Basic Operations...
Page 244: ...Chapter 10 IPv4 and IPv6 Management Address Commands 244 Section II Basic Operations...
Page 264: ...Chapter 12 SNTP Client Commands 264 Section II Basic Operations...
Page 298: ...Chapter 15 Enhanced Stacking 298 Section II Basic Operations...
Page 312: ...Chapter 16 Enhanced Stacking Commands 312 Section II Basic Operations...
Page 318: ...Chapter 17 Port Mirror 318 Section II Basic Operations...
Page 324: ...Chapter 18 Port Mirror Commands 324 Section II Basic Operations Example awplus show mirror...
Page 350: ...Chapter 21 Multicast Commands 350 Section II Basic Operations...
Page 352: ...352 Section III File System...
Page 360: ...Chapter 22 File System 360 Section III File System...
Page 383: ...AT 9000 Switch Command Line User s Guide Section III File System 383 Example awplus show boot...
Page 386: ...Chapter 25 Boot Configuration File Commands 386 Section III File System...
Page 398: ...Chapter 26 File Transfers 398 Section III File System...
Page 406: ...Chapter 27 File Transfer Commands 406 Section III File System...
Page 408: ...408 Section IV Event Messages...
Page 430: ...Chapter 30 Syslog Client 430 Section IV Event Messages...
Page 438: ...438 Section V Port Trunks...
Page 448: ...Chapter 32 Static Port Trunks 448 Section V Port Trunks...
Page 480: ...480 Section VI Spanning Tree Protocols...
Page 520: ...Chapter 38 STP Commands 520 Section VI Spanning Tree Protocols...
Page 558: ...558 Section VII Virtual LANs...
Page 600: ...Chapter 42 Port based and Tagged VLAN Commands 600 Section VII Virtual LANs...
Page 634: ...Chapter 44 GARP VLAN Registration Protocol Commands 634 Section VII Virtual LANs...
Page 670: ...Chapter 47 Private Port VLANs 670 Section VII Virtual LANs...
Page 692: ...Chapter 50 VLAN Stacking 692 Section VII Virtual LANs...
Page 698: ...Chapter 51 VLAN Stacking Commands 698 Section VII Virtual LANs...
Page 700: ...700 Section VIII Port Security...
Page 748: ...Chapter 54 802 1x Port based Network Access Control 748 Section VIII Port Security...
Page 790: ...Chapter 55 802 1x Port based Network Access Control Commands 790 Section VIII Port Security...
Page 792: ...792 Section IX Simple Network Management Protocols...
Page 804: ...Chapter 56 SNMPv1 and SNMPv2c 804 Section X Simple Network Management Protocols...
Page 852: ...852 Section X Network Management...
Page 976: ...Chapter 63 Address Resolution Protocol ARP 976 Section X Network Management...
Page 1090: ...1090 Section XI Management Security...
Page 1114: ...Chapter 71 Telnet Server 1114 Section XI Management Security...
Page 1122: ...Chapter 73 Telnet Client 1122 Section XI Management Security...
Page 1126: ...Chapter 74 Telnet Client Commands 1126 Section XI Management Security...
Page 1138: ...Chapter 75 Secure Shell SSH Server 1138 Section XI Management Security...
Page 1158: ...Chapter 78 Non secure HTTP Web Browser Server Commands 1158 Section XI Management Security...
Page 1186: ...Chapter 80 Secure HTTPS Web Browser Server Commands 1186 Section XI Management Security...
Page 1202: ...Chapter 81 RADIUS and TACACS Clients 1202 Section XI Management Security...
Page 1230: ...Chapter 82 RADIUS and TACACS Client Commands 1230 Section XI Management Security...