Chapter 13
ACL
The fast growth of network size and traffic brings challenges to network security and
bandwidth allocation. Packet filtering can prevent unauthorized access behaviors and improve
bandwidth use.
ACL (Access Control List), which is based on rule matching, is primarily used for packet filtering.
ACL accurately identifies and controls packets on the network to manage network access
behaviors, prevent network attacks, and improve bandwidth use efficiency. In this way, ACL
ensures security and high service quality on networks. It is usually applied in the following
occasions:
To prevent various network attacks, such as IP (Internet Protocol), TCP (Transmission Control
Protocol), and ICMP (Internet Control Message Protocol) packets attacks.
To manage network access behaviors, such as controlling access to a network or to specific
resources on your network.
The ACL module is mainly for ACL configuration of the switch, including three submenus:
Time-Range
,
ACL Config
and
ACL Binding
.
13.1
Time-Range
If a configured ACL is needed to be effective in a specified time-range, a time-range should be
firstly specified in the ACL. As the time-range based ACL takes effect only within the specified
time-range, data packets can be filtered by differentiating the time-ranges.
On this switch absolute time and periodic time can be configured. Configure an absolute time
section in the form of “the start date to the end date” to make ACLs effective; configure a
periodic time section to make ACLs effective on the fixed days of the week.
The Time-Range configuration can be implemented on
Time-Range Summary
page.
13.1.1
Time-Range Summary
On this page you can view the current time-ranges.
Choose the menu
ACL
→
Time-Range
→
Time-Range Summary
to load the following page.
Figure 13-1 Time-Range Table
Configuration Procedure:
1)
To add a new time range, click “
Add
” to load the following page. Then enter the name of
the time-range for time identification and click “Create”. You can view the entry in the
Time-Range Table.
322