10-24
IPv4 Access Control Lists (ACLs)
Overview
5.
Assign the ACLs to the interfaces you want to filter, using the ACL
application (static port ACL, VACL, or RACL) appropriate for each assign-
ment. (For RADIUS-assigned ACLs, refer to the Note in the table in step
1 on page 10-23.)
6.
If you are using an RACL, ensure that IPv4 routing is enabled on the switch.
7.
Test for desired results.
For more details on ACL planning considerations, refer to “Planning an ACL
Application” on page 10-29.
Notes on IPv4
Routing
To activate a RACL to screen inbound IPv4 traffic for routing between subnets,
assign the RACL to the statically configured VLAN on which the traffic enters
the switch. Also, ensure that IPv4 routing is enabled. Similarly, to activate a
RACL to screen routed, outbound IPv4 traffic, assign the RACL to the statically
configured VLAN on which the traffic exits from the switch. A RACL config-
ured to screen inbound IPv4 traffic with a destination address on the switch
itself does not require routing to be enabled. (ACLs do not screen outbound
IPv4 traffic generated by the switch, itself.) Refer to “ACL Screening of IPv4
Traffic Generated by the Switch” on page 10-128.)
Caution Regarding
the Use of Source
Routing
Source routing is enabled by default on the switch and can be used to override
ACLs. For this reason, if you are using ACLs to enhance network security, the
recommended action is to use the
no ip source-route
command to disable
source routing on the switch. (If source routing is disabled in the running-
config file, the
show running
command includes “
no ip source-route
” in the
running-config file listing.)
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......