ACL Configuration Process
93
15 Access Control Lists (ACLs)
ACL Configuration Process
To configure ACLs, follow these steps:
•
Create a MAC ACL by specifying a name.
•
Create an IP ACL by specifying a number.
•
Add new rules to the ACL.
•
Configure the match criteria for the rules.
•
Apply the ACL to one or more interfaces.
IP ACL CLI Example
The script in this section shows you how to set up an IP ACL with two rules, one applicable to
TCP traffic and one to UDP traffic. The content of the two rules is the same. TCP and UDP
packets will only be accepted by the Unified Switch if the source and destination stations have
IP addresses that fall within the defined sets.
Figure 46.
IP ACL Example Network Diagram
Port 0/2
ACL 179
192.168.77.1
192.168.77.2
192.168.77.9
192.168.77.4
UDP or TCP packet to
192.168.77.3 accepted:
Dest. IP in range
UDP or TCP packet to
192.168.88.3 rejected:
Dest. IP not in range
Layer 2
Switch
Unified Switch
Summary of Contents for UNIFIED WIRED & WIRELESS ACCESS SYSTEM...
Page 2: ...2 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 12: ...12 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 14: ...14 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 32: ...32 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 40: ...40 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 44: ...44 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 56: ...56 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 66: ...66 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 84: ...84 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 90: ...90 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 103: ...Web Examples 103 15 Access Control Lists ACLs Figure 57 Attach IP ACL to an Interface ...
Page 110: ...110 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 123: ...Web Examples 123 18 Port Security Figure 70 Port Security Violation Status ...
Page 124: ...124 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 129: ...RADIUS Configuration Examples 129 19 RADIUS Figure 73 Configuring the RADIUS Server ...
Page 137: ...TACACS Configuration Example 137 20 TACACS Figure 82 Set the User Login TACACS ...
Page 138: ...138 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 146: ...146 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 176: ...176 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 184: ...184 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...