Configuration Guide
Access
Control List Configuration
Access Control List Configuration
Overview
As part of our security solution, ACL is used to provide a powerful data flow filtering function. At
present, our product supports the following access lists:
Standard IP access control list
Extended IP access control list
MAC access control list
MAC extended access control list
Expert extended access control list
IPV6 extended access control list
Depending on the conditions of networks, you can choose different access control lists to control data
flows.
Access Control List Introduction
ACLs is the shortened form of Access Control Lists, or Access Lists. It is also popularly called firewall,
or packet filtering in some documentation. ACL controls the messages on the device interface by
defining some rules: Permit or Deny. According to usage ranges, they can be divided into ACLs and
QoS ACLs.
By filtering the data streams, you can restrict the communication data types in the network and restrict
the users of the network and the device they can use. When data streams pass the switch, ACLs
classify and filter them, that is, check the data streams input from the specified interface and
determine whether to permit or deny them according to the matching conditions.
To sum up, the security ACL is used to control which dataflow is allowed to pass through the network
device. The QoS policy performs priority classification and processing for the dataflow.
ACLs consist of a series of entries, known as Access Control Entry (ACE). Each entry specifies its
matching condition and behavior.
Access list rules can be about the source addresses, destination addresses, upper layer protocols,
time-ranges or other information of data flows.
Why to Configure Access Lists
There are many reasons why we need configure access lists. Some of them are as follows:
Restrict route updating: Control where to send and receive the route updating information.
Restrict network access: To ensure network security, by defining rules, make users unable to
access some services. (When a user only need access the WWW and E-mail services, then
Summary of Contents for RG-S2900G-E Series
Page 1: ...RG S2900G E Series Switch RGOS Configuration Guide Release 10 4 2b12 p1 ...
Page 91: ...Configuration Guide Configuring PoE Configuration ...
Page 133: ...Configuration Guide EEE Configuration ...
Page 319: ...Configuration Guide QinQ Configuration ...
Page 408: ......
Page 409: ...IP Routing Configuration 1 Static Route Configuration ...
Page 412: ......
Page 413: ...Multicast Configuration 1 IGMP Snooping Configuration 2 MLD Snooping Configuration ...
Page 757: ......
Page 758: ...ACL QoS Configuration 1 Access Control List Configuration 2 QoS Configuration ...
Page 801: ...Reliability Configuration 1 RLDP Configuration 2 TPP Configuration 3 SEM Configuration ...
Page 901: ...Configuration Guide ERSPAN Configuration ...
Page 902: ...Web based Configuration 1 Web based Configuration ...