
C
HAPTER
4
| Configuring the Switch
Access Control Lists
– 118 –
A
CCESS
C
ONTROL
L
ISTS
An Access Control List (ACL) is a sequential list of permit or deny
conditions that apply to IP addresses, MAC addresses, or other more
specific criteria. This switch tests ingress packets against the conditions in
an ACL one by one. A packet will be accepted as soon as it matches a
permit rule, or dropped as soon as it matches a deny rule. If no rules
match, the frame is accepted. Other actions can also be invoked when a
matching packet is found, including rate limiting, copying matching packets
to another port or to the system log, or shutting down a port.
A
SSIGNING
ACL
P
OLICIES
AND
R
ESPONSES
The ACL Port Configuration page can be used to define a port to which
matching frames are copied, enable logging, or shut down a port when a
matching frame is seen. Note that rate limiting (configured with the Rate
Limiter menu,
page 119
) is implemented regardless of whether or not a
matching packet is seen.
P
ARAMETERS
The following options are displayed on the ACL Port Configuration page:
◆
Port
- Port Identifier.
◆
Policy ID
- An ACL policy configured on the ACE Configuration page
(
page 122
). (Range: 1-8; Default: 1, which is undefined)
◆
Action
- Permits or denies a frame based on whether it matches a rule
defined in the assigned policy. (Default: Permit)
◆
Rate Limiter ID
- Specifies a rate limiter (
page 119
) to apply to the
port. (Range: 1-14; Default: Disabled)
◆
Port Copy
- Defines a port to which matching frames are copied.
(Range: 1-28; Default: Disabled)
◆
Shutdown
- Shuts down a port when a macthing frame is seen.
(Default: Disabled)
◆
Counter
- The number of frames which have matched any of the rules
defined in the selected policy.
Summary of Contents for ES4528V-38
Page 1: ...Management Guide www edge core com 28 Port Gigabit Ethernet Switch...
Page 2: ......
Page 4: ......
Page 6: ...ABOUT THIS GUIDE 6...
Page 22: ...FIGURES 22...
Page 26: ...SECTION Getting Started 26...
Page 46: ...CHAPTER 2 Initial Switch Configuration Managing System Files 46...
Page 48: ...SECTION Web Configuration 48...
Page 75: ...CHAPTER 4 Configuring the Switch Creating Trunk Groups 75 Figure 11 LACP Port Configuration...
Page 186: ...CHAPTER 6 Performing Basic Diagnostics Running Cable Diagnostics 186...
Page 192: ...CHAPTER 7 Performing System Maintenance Managing Configuration Files 192...
Page 242: ...CHAPTER 12 Port Commands 242...
Page 248: ...CHAPTER 13 Link Aggregation Commands 248...
Page 266: ...CHAPTER 15 RSTP Commands 266...
Page 276: ...CHAPTER 16 IEEE 802 1X Commands 276...
Page 286: ...CHAPTER 17 IGMP Commands 286...
Page 294: ...CHAPTER 18 LLDP Commands 294...
Page 300: ...CHAPTER 19 MAC Commands 300...
Page 310: ...CHAPTER 21 PVLAN Commands 310...
Page 322: ...CHAPTER 22 QoS Commands 322...
Page 356: ...CHAPTER 26 SNMP Commands 356...
Page 359: ...CHAPTER 27 HTTPS Commands 359 EXAMPLE HTTPS redirect enable HTTPS...
Page 360: ...CHAPTER 27 HTTPS Commands 360...
Page 366: ...CHAPTER 29 UPnP Commands 366...
Page 374: ...CHAPTER 31 Firmware Commands 374...
Page 376: ...SECTION Appendices 376...
Page 390: ...GLOSSARY 390...
Page 395: ......