10-20
IPv4 Access Control Lists (ACLs)
Overview
N o t e
In cases where an RACL and any type of port or VLAN ACL are filtering traffic
entering the switch, the
switched
traffic explicitly permitted by the port or
VLAN ACL is not filtered by the RACL (except where the traffic has a
destination on the switch itself). However,
routed
traffic explicitly permitted
by the port or VLAN ACL (and any switched traffic having a destination on the
switch itself) must also be explicitly permitted by the RACL, or it will be
dropped.
Also, a switched packet is not affected by an outbound RACL assigned to the
VLAN on which the packet exits from the switch.
For a Packet To Be Permitted, It Must Have a Match with a “Permit”
ACE in All Applicable ACLs Assigned to an Interface.
On a given inter-
face where multiple ACLs apply to the same traffic, a packet having a match
with a
deny
ACE in any applicable ACL on the interface (including an implicit
deny any
) will be dropped.
For example, suppose the following is true:
■
Port A10 belongs to VLAN 100.
■
A static port ACL is configured on port A10.
■
A VACL is configured on VLAN 100.
■
An RACL is also configured for inbound, routed traffic on VLAN 100.
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......