User Guide
163
To configure storm constrain settings on a specified port, click the corresponding port.
To configure storm constrain settings on multiple ports, click
Config
.
4.7.3 ACL
ACL Overview
As traffic increases and network grows, network security appears more and more important. Pack filter
can effectively block unauthorized users from accessing network and control traffic volume on the
network for the purpose of conserving network resources. An access control list (ACL) implements packet
filter via configured rules and operations attached to a packet.
When the switch receives a packet, it analyzes the packet using currently applied ACL rules and then
handles the packet by preset operations (permit, prohibit or limit rate, mirroring, etc).
ACL Type
The following 2 ACLs are supported:
MAC Based ACL: Specify operation rules based on source MAC, destination MAC, 802.1P priority, L2
protocol type and other L2 information of the packet.
IP Based ACL: Specify operation rules based on protocol type, source IP, destination IP and protocol
feature (source/destination TCP/UDP ports) of the packet.