Chapter 13: Security Measures
Access Control Lists
– 302 –
2.
Select Configure User Key from the Step list.
3.
Select Show from the Action list.
4.
Select a user from the User Name list.
5.
Select the host-key type to clear.
6.
Click Clear.
Figure 13-34: Showing the SSH User’s Public Key
A
CCESS
C
ONTROL
L
ISTS
Access Control Lists (ACL) provide packet filtering for IPv4/IPv6 frames
(based on address, protocol, Layer 4 protocol port number or TCP control
code), IPv6 frames (based on address, DSCP traffic class, or next header
type), or any frames (based on MAC address or Ethernet type). To filter
incoming packets, first create an access list, add the required rules, and
then bind the list to a specific port.
Configuring Access Control Lists –
An ACL is a sequential list of permit or deny conditions that apply to IP
addresses, MAC addresses, or other more specific criteria. This switch tests
ingress packets against the conditions in an ACL one by one. A packet will
be accepted as soon as it matches a permit rule, or dropped as soon as it
matches a deny rule. If no rules match, the packet is accepted.
C
OMMAND
U
SAGE
The following restrictions apply to ACLs:
•
The maximum number of ACLs is 64.
•
The maximum number of rules per system is 512 rules.
Summary of Contents for SSE-G2252
Page 42: ...44 General IP Routing on page 627...
Page 603: ...Chapter 16 IP Configuration Setting the Switch s IP Address IP Version 6 609...
Page 883: ...Chapter 24 General Security Measures Port based Traffic Segmentation 894...
Page 989: ...Chapter 30 Congestion Control Commands Automatic Traffic Control Commands 1000 Console...
Page 1007: ...Chapter 33 Address Table Commands 1019...
Page 1137: ...Chapter 38 Quality of Service Commands 1150...