Operation Manual – ACL
H3C S3100 Series Ethernet Switches
Table of Contents
i
Table of Contents
Chapter 1 ACL Configuration....................................................................................................... 1-1
1.1 ACL Overview .................................................................................................................... 1-1
1.1.1 ACL Matching Order ............................................................................................... 1-1
1.1.2 Ways to Apply an ACL on a Switch......................................................................... 1-2
1.1.3 Types of ACLs Supported by S3100 Series Ethernet Switches ............................. 1-3
1.2 ACL Configuration.............................................................................................................. 1-4
1.2.1 Configuring Time Range ......................................................................................... 1-4
1.2.2 Configuring Basic ACL ............................................................................................ 1-5
1.2.3 Configuring Advanced ACL..................................................................................... 1-7
1.2.4 Configuring Layer 2 ACL......................................................................................... 1-8
1.3 ACL Assignment .............................................................................................................. 1-10
1.3.1 Assigning an ACL Globally.................................................................................... 1-10
1.3.2 Assigning an ACL to a VLAN ................................................................................ 1-11
1.3.3 Assigning an ACL to a Port Group ........................................................................ 1-12
1.3.4 Assigning an ACL to a Port ................................................................................... 1-12
1.4 Displaying ACL Configuration.......................................................................................... 1-13
1.5 Example for Upper-layer Software Referencing ACLs .................................................... 1-14
1.5.1 Example for Controlling Telnet Login Users by Source IP.................................... 1-14
1.5.2 Example for Controlling Web Login Users by Source IP ...................................... 1-14
1.6 Example for Applying ACLs to Hardware ........................................................................ 1-15
1.6.1 Basic ACL Configuration Example ........................................................................ 1-15
1.6.2 Advanced ACL Configuration Example................................................................. 1-16
1.6.3 Layer 2 ACL Configuration Example..................................................................... 1-17
1.6.4 Example for Applying an ACL to a Port Group ..................................................... 1-18