10-13
IPv4 Access Control Lists (ACLs)
Overview
Overview
Types of IPv4 ACLs
A permit or deny policy for IPv4 traffic you want to filter can be based on
source address alone, or on source address plus other factors.
Standard ACL:
Use a standard ACL when you need to permit or deny IPv4
traffic based on source address only. Standard ACLs are also useful when you
need to quickly control a performance problem by limiting IPv4 traffic from a
subnet, group of devices, or a single device. (This can block all IPv4 traffic
from the configured source, but does not hamper IPv4 traffic from other
sources within the network.) A standard ACL uses an alphanumeric ID string
or a numeric ID of 1 through 99. You can specify a single host, a finite group
of hosts, or any host.
Extended ACL:
Use an extended ACL when simple IPv4 source address
restrictions do not provide the sufficient traffic selection criteria needed on
an interface. Extended ACLs allow use of the following criteria:
■
source and destination IPv4 address combinations
■
IPv4 protocol options
Extended, named ACLs also offer an option to permit or deny IPv4 connec-
tions using TCP for applications such as Telnet, http, ftp, and others.
Connection-Rate ACL.
An optional feature used with Connection-Rate fil-
tering based on virus-throttling technology. Refer to chapter 3, “Virus Throt-
tling”.
ACL Applications
ACL filtering is applied to IPv4 traffic as follows:
■
Routed ACL (RACL)— on a VLAN configured with an RACL:
•
Routed IPv4 traffic entering or leaving the switch. (Routing can be
between different VLANs or between different subnets in the same
VLAN. Routing
must
be enabled.)
Содержание HP ProCurve Series 6600
Страница 2: ......
Страница 6: ...iv ...
Страница 26: ...xxiv ...
Страница 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Страница 204: ...4 72 Web and MAC Authentication Client Status ...
Страница 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Страница 756: ...16 8 Key Management System Configuring Key Chain Management ...
Страница 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Страница 777: ......