10-23
IPv4 Access Control Lists (ACLs)
Overview
General Steps for Planning and Configuring ACLs
1.
Identify the ACL action to apply. As part of this step, determine the best
points at which to apply specific ACL controls. For example, you can
improve network performance by filtering unwanted IPv4 traffic at the
edge of the network instead of in the core. Also, on the switch itself, you
can improve performance by filtering unwanted IPv4 traffic where it is
inbound to the switch instead of outbound.
2.
Identify the traffic types to filter. (IPv4 only, unless the ACL is a RADIUS-
assigned ACL, which supports IPv4
and
IPv6 filtering.
•
The SA and/or the DA of traffic you want to permit or deny. This can
be a single host, a group of hosts, a subnet, or all hosts.
•
Traffic of a specific IPv4 protocol type (0-255)
•
Any TCP traffic (only) for a specific TCP port or range of ports,
including optional control of connection traffic based on whether the
initial request should be allowed
•
All UDP traffic or UDP traffic for a specific UDP port
•
All ICMP traffic or ICMP traffic of a specific type and code
•
All IGMP traffic or IGMP traffic of a specific type
•
Any of the above with specific precedence and/or ToS settings
3.
Design the ACLs for the control points (interfaces) you have selected.
Where you are using explicit “deny” ACEs, you can optionally use the
VACL logging feature for notification that the switch is denying unwanted
packets.
4.
Configure the ACLs on the selected switches.
Traffic Source
ACL Application
IPv4 or IPv6 traffic from a specific,
authenticated client
RADIUS-assigned ACL for inbound IP
traffic from an authenticated client on a
port*
IPv4 traffic entering the switch on a
specific port
static port ACL (static-port assigned) for
any inbound IPv4 traffic on a port from any
source
switched or routed IPv4 traffic entering the
switch on a specific VLAN
VACL (VLAN ACL)
routed IPv4 traffic entering or leaving the
switch on a specific VLAN
RACL (routed ACL)
*For more on this option, refer to chapter 7, “Configuring RADIUS Server Support for
Switch Services”, and also to the documentation for your RADIUS server.)
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......