Getting Started
Applications for Access Control Lists (ACLs)
Applications for Access Control Lists
(ACLs)
Layer 3 IP filtering with Access Control Lists (ACLs) enables you to improve
network performance and restrict network use by creating policies for:
■
Switch Management Access:
Permits or denies in-band management
access. This includes preventing the use of certain TCP or UDP applica
tions (such as Telnet, SSH, web browser, and SNMP) for transactions
between specific source and destination IP addresses.)
■
Application Access Security:
Eliminating unwanted IP, TCP, or UDP
traffic in a path by filtering packets where they enter or leave the switch
on specific VLAN interfaces.
ACLs can filter traffic to or from a host, a group of hosts, or entire subnets.
N o t e o n A C L
ACLs can enhance network security by blocking selected IP traffic, and can
S e c u r i t y U s e
serve as one aspect of maintaining network security.
However, because ACLs
do not provide user or device authentication, or protection from malicious
manipulation of data carried in IP packet transmissions, they should not
be relied upon for a complete security solution
.
For information on how to apply ACLs in a network populated with ProCurve
switches that support the ACL feature, refer to the chapter titled “Access
Control Lists (ACLs)” in the
Advanced Traffic Management Guide
for your
switch.
1-12
Содержание J8697A
Страница 1: ...6200yl Access Security Guide 5400zl 3500yl ProCurve Switches K 11 XX www procurve com ...
Страница 2: ......
Страница 22: ...Product Documentation Feature Index xx ...
Страница 55: ...Configuring Username and Password Security Front Panel Security 2 21 ...
Страница 56: ...Configuring Username and Password Security Front Panel Security 2 22 ...
Страница 58: ...Virus Throttling Contents Operating Notes 3 30 Connection Rate Log and Trap Messages 3 31 3 2 ...
Страница 88: ...Virus Throttling Connection Rate Log and Trap Messages This page is intentionally unused 3 32 ...
Страница 118: ...Web and MAC Authentication Client Status This page intentionally unused 4 30 ...
Страница 230: ...Configuring Secure Socket Layer SSL Common Errors in SSL setup This page is intentionally unused 8 22 ...
Страница 356: ...Configuring and Monitoring Port Security Operating Notes for Port Security 11 44 ...
Страница 370: ...Using Authorized IP Managers Operating Notes This page is intentionally unused 12 14 ...
Страница 388: ...10 Index ...
Страница 389: ......