![Dell PowerConnect M6220 User Configuration Manual Download Page 523](http://html.mh-extra.com/html/dell/powerconnect-m6220/powerconnect-m6220_user-configuration-manual_84547523.webp)
Configuring Access Control Lists
523
20
Configuring Access Control Lists
This chapter describes how to configure Access Control Lists (ACLs),
including IPv4, IPv6, and MAC ACLs. This chapter also describes how to
configure time ranges that can be applied to any of the ACL types.
The topics covered in this chapter include:
• ACL Overview
• Configuring ACLs (Web)
• Configuring ACLs (CLI)
• ACL Configuration Examples
ACL Overview
Access Control Lists (ACLs) are a collection of permit and deny conditions,
called rules, that provide security by blocking unauthorized users and
allowing authorized users to access specific resources.
ACLs can also provide traffic flow control, restrict contents of routing
updates, and decide which types of traffic are forwarded or blocked. ACLs can
reside in a firewall router, a router connecting two internal networks, or a
Layer 3 switch, such as a PowerConnect M6220/M6348/M8024/M8024-k
switch.
You can also create an ACL that limits access to the management interfaces
based on the connection method (for example, Telnet or HTTP) and/or the
source IP address.
The PowerConnect M6220, M6348, M8024, and M8024-k switches support
ACL configuration in both the ingress and egress direction. Egress ACLs
provide the capability to implement security rules on the egress flows (traffic
leaving a port) rather than the ingress flows (traffic entering a port). Ingress
and egress ACLs can be applied to any physical port, port-channel (LAG), or
VLAN routing port.
Summary of Contents for PowerConnect M6220
Page 52: ...52 Introduction ...
Page 86: ...86 Switch Features ...
Page 100: ...100 Hardware Overview ...
Page 116: ...116 Using the Command Line Interface ...
Page 121: ...Default Settings 121 ...
Page 122: ...122 Default Settings ...
Page 142: ...142 Setting Basic Network Information ...
Page 206: ...206 Configuring Authentication Authorization and Accounting ...
Page 292: ...292 Managing General System Settings Figure 11 31 Verify MOTD ...
Page 296: ...296 Managing General System Settings ...
Page 332: ...332 Configuring SNMP ...
Page 408: ...408 Monitoring Switch Traffic ...
Page 560: ...560 Configuring Access Control Lists ...
Page 591: ...Configuring VLANs 591 Figure 21 17 GVRP Port Parameters Table ...
Page 597: ...Configuring VLANs 597 Figure 21 24 Double VLAN Port Parameter Table ...
Page 693: ...Configuring Port Based Traffic Control 693 Figure 24 3 Storm Control 5 Click Apply ...
Page 780: ...780 Configuring Connectivity Fault Management ...
Page 804: ...804 Snooping and Inspecting Traffic Figure 27 17 DAI Interface Configuration Summary ...
Page 818: ...818 Snooping and Inspecting Traffic ...
Page 836: ...836 Configuring Link Aggregation ...
Page 860: ...860 Configuring Data Center Bridging Features ...
Page 906: ...906 Configuring DHCP Server Settings ...
Page 940: ...940 Configuring L2 and L3 Relay Features Figure 34 3 DHCP Relay Interface Summary ...
Page 1080: ...1080 Configuring VRRP ...
Page 1104: ...1104 Configuring IPv6 Routing ...
Page 1131: ...Configuring Differentiated Services 1131 Figure 40 5 DiffServ Class Criteria ...
Page 1158: ...1158 Configuring Class of Service Figure 41 1 Mapping Table Configuration CoS 802 1P ...
Page 1174: ...1174 Configuring Auto VoIP Figure 42 2 Auto VoIP Interface Configuration ...
Page 1240: ...1240 Managing IPv4 and IPv6 Multicast Figure 43 51 DVMRP Next Hop Summary ...
Page 1266: ...1266 Managing IPv4 and IPv6 Multicast ...
Page 1274: ...1274 System Process Definitions ...
Page 1294: ...1294 Index ...