![HP HP ProCurve Series 6600 Access Security Manual Download Page 422](http://html.mh-extra.com/html/hp/hp-procurve-series-6600/hp-procurve-series-6600_access-security-manual_163101422.webp)
10-2
IPv4 Access Control Lists (ACLs)
Introduction
IPv4 filtering with ACLs can help improve network performance and restrict
network use by creating policies for:
■
Switch Management Access:
Permits or denies in-band manage-
ment access. This includes limiting and/or preventing the use of
designated protocols that run on top of IPv4, such as TCP, UDP, IGMP,
ICMP, and others. Also included are the use of precedence and ToS
criteria, and control for application transactions based on source and
destination IPv4 addresses and transport layer port numbers.
■
Application Access Security:
Eliminates unwanted traffic in a path
by filtering IPv4 packets where they enter or leave the switch on
specific VLAN interfaces.
IPv4 ACLs can filter traffic to or from a host, a group of hosts, or entire subnets.
N o t e s
IPv4 ACLs can enhance network security by blocking selected traffic, and can
serve as part of your network security program.
However, because ACLs do
not provide user or device authentication, or protection from malicious
manipulation of data carried in IPv4 packet transmissions, they should not
be relied upon for a complete security solution
.
IPv4 ACLs on the switches covered by this manual do not filter non-IPv4 traffic
such as IPv6, AppleTalk, and IPX packets.
Configure an ACL from a TFTP Server
n/a
Enable ACL Logging
n/a
Feature
Default
CLI
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......