10-34
IPv4 Access Control Lists (ACLs)
Planning an ACL Application
application on the same interface. For example, configuring an RACL
named “100” to filter inbound routed traffic on VLAN 20, but later, you
configured another RACL named 112 to filter inbound routed traffic
on this same VLAN, RACL 112 replaces RACL 100 as the ACL to use.
■
Static Port ACLs:
These are applied per-port, per port-list, or per
static trunk. Adding a port to a trunk applies the trunk’s ACL config-
uration to the new member. If a port is configured with an ACL, the
ACL must be removed before the port is added to the trunk. Also,
removing a port from an ACL-configured trunk removes the ACL
configuration from that port.
■
VACLs:
These filter any IPv4 traffic entering the switch through any
port belonging to the designated VLAN. VACLs do not filter traffic
leaving the switch or being routed from another VLAN.
■
VACLs and RACLs Operate On Static VLANs:
You can assign an
ACL to any VLAN that is statically configured on the switch. ACLs do
not operate with dynamic VLANs.
■
A VACL or RACL Affects All Physical Ports in a Static VLAN:
A VACL or RACL assigned to a VLAN applies to all physical ports on
the switch belonging to that VLAN, including ports that have dynam-
ically joined the VLAN.
■
RACLs Screen Routed IPv4 Traffic Entering or Leaving the
Switch on a Given VLAN Interface:
This means that the following
traffic is subject to ACL filtering:
•
IPv4 traffic arriving on the switch through one VLAN and leaving the
switch through another VLAN
•
IPv4 traffic arriving on the switch through one subnet and leaving the
switch through another subnet within the same, multinetted VLAN
Filtering the desired, routed traffic requires assigning an RACL to screen
traffic inbound or outbound on the appropriate VLAN(s). In the case of a
multinetted VLAN, it means that IPv4 traffic inbound from different
subnets in the same VLAN is screened by the same inbound RACL, and
IPv4 traffic outbound from different subnets is screened by the same
outbound RACL. (Refer to figure 10-1 on page 10-15.)
■
RACLs Do Not Filter Switched IPv4 Traffic Unless the Switch
Itself is the SA or DA:
RACLs do
not
filter traffic moving between
ports belonging to the same VLAN or subnet (in the case of a
subnetted VLAN). (IPv4 traffic moving between ports in different
subnets of the same VLAN can be filtered.)
Summary of Contents for E3800 Series
Page 2: ......
Page 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Page 30: ...xxviii ...
Page 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Page 186: ...4 72 Web and MAC Authentication Client Status ...
Page 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Page 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 730: ...20 Index ...
Page 731: ......