Configuring Access Control Lists
539
20
Configuring Access Control Lists
This chapter describes how to configure Access Control Lists (ACLs),
including IPv4, IPv6, and MAC ACLs. This chapter also describes how to
configure time ranges that can be applied to any of the ACL types.
The topics covered in this chapter include:
• ACL Overview
• Configuring ACLs (Web)
• Configuring ACLs (CLI)
• ACL Configuration Examples
ACL Overview
Access Control Lists (ACLs) are a collection of permit and deny conditions,
called rules, that provide security by blocking unauthorized users and
allowing authorized users to access specific resources.
ACLs can also provide traffic flow control, restrict contents of routing
updates, and decide which types of traffic are forwarded or blocked. ACLs can
reside in a firewall router, a router connecting two internal networks, or a
Layer 3 switch, such as a PowerConnect 7000 Series switch.
The PowerConnect 7000 Series switches support ACL configuration in both
the ingress and egress direction. Egress ACLs provide the capability to
implement security rules on the egress flows (traffic leaving a port) rather
than the ingress flows (traffic entering a port). Ingress and egress ACLs can be
applied to any physical port, port-channel (LAG), or VLAN routing port.
Depending on whether an ingress or egress ACL is applied to a port, when the
traffic enters (ingress) or leaves (egress) a port, the ACL compares the criteria
configured in its rules, in order, to the fields in a packet or frame to check for
matching conditions. The ACL forwards or blocks the traffic based on the
rules.
Содержание PowerConnect 7024
Страница 134: ...134 Setting Basic Network Information ...
Страница 290: ...290 Managing General System Settings Figure 11 14 SNTP Servers Table ...
Страница 348: ...348 Configuring SNMP ...
Страница 430: ...430 Monitoring Switch Traffic ...
Страница 444: ...444 Configuring iSCSI Optimization ...
Страница 521: ...Configuring 802 1X and Port Based Security 521 Figure 19 8 Configure Port Security Settings 5 Click Apply ...
Страница 538: ...538 Configuring 802 1X and Port Based Security ...
Страница 585: ...Configuring VLANs 585 Figure 21 5 Add Ports to VLAN 4 Click Apply 5 Verify that the ports have been added to the VLAN ...
Страница 594: ...594 Configuring VLANs Figure 21 16 GVRP Port Parameters Table ...
Страница 600: ...600 Configuring VLANs Figure 21 23 Double VLAN Port Parameter Table ...
Страница 658: ...658 Configuring the Spanning Tree Protocol ...
Страница 693: ...Configuring Port Based Traffic Control 693 Figure 24 3 Storm Control 5 Click Apply ...
Страница 780: ...780 Configuring Connectivity Fault Management ...
Страница 804: ...804 Snooping and Inspecting Traffic Figure 27 17 DAI Interface Configuration Summary ...
Страница 818: ...818 Snooping and Inspecting Traffic ...
Страница 836: ...836 Configuring Link Aggregation ...
Страница 882: ...882 Configuring DHCP Server Settings ...
Страница 916: ...916 Configuring L2 and L3 Relay Features Figure 33 3 DHCP Relay Interface Summary ...
Страница 924: ...924 Configuring L2 and L3 Relay Features Figure 33 12 IP Helper Statistics ...
Страница 930: ...930 Configuring L2 and L3 Relay Features ...
Страница 1004: ...1004 Configuring OSPF and OSPFv3 ...
Страница 1044: ...1044 Configuring VRRP ...
Страница 1057: ...Configuring IPv6 Routing 1057 Figure 37 9 IPv6 Route Preferences ...
Страница 1064: ...1064 Configuring IPv6 Routing ...
Страница 1084: ...1084 Configuring DHCPv6 Server and Relay Settings ...
Страница 1091: ...Configuring Differentiated Services 1091 Figure 39 5 DiffServ Class Criteria ...
Страница 1114: ...1114 Configuring Differentiated Services ...
Страница 1130: ...1130 Configuring Class of Service ...
Страница 1136: ...1136 Configuring Auto VoIP ...
Страница 1216: ...1216 Managing IPv4 and IPv6 Multicast ...