Configuration Guide
Access
Control List Configuration
Access Control List Configuration
Overview
As part of our security solution, ACL is used to provide a powerful data flow filtering function. At
present, our product supports the following access lists:
Standard IP access control list
Extended IP access control list
MAC access control list
MAC extended access control list
Expert extended access control list
IPV6 extended access control list
Depending on the conditions of networks, you can choose different access control lists to control data
flows.
Access Control List Introduction
ACLs is the shortened form of Access Control Lists, or Access Lists. It is also popularly called firewall,
or packet filtering in some documentation. ACL controls the messages on the device interface by
defining some rules: Permit or Deny. According to usage ranges, they can be divided into ACLs and
QoS ACLs.
By filtering the data streams, you can restrict the communication data types in the network and restrict
the users of the network and the device they can use. When data streams pass the switch, ACLs
classify and filter them, that is, check the data streams input from the specified interface and
determine whether to permit or deny them according to the matching conditions.
To sum up, the security ACL is used to control which dataflow is allowed to pass through the network
device. The QoS policy performs priority classification and processing for the dataflow.
ACLs consist of a series of entries, known as Access Control Entry (ACE). Each entry specifies its
matching condition and behavior.
Access list rules can be about the source addresses, destination addresses, upper layer protocols,
time-ranges or other information of data flows.
Why to Configure Access Lists
There are many reasons why we need configure access lists. Some of them are as follows:
Restrict route updating: Control where to send and receive the route updating information.
Restrict network access: To ensure network security, by defining rules, make users unable to
access some services. (When a user only need access the WWW and E-mail services, then
Содержание RG-S2900G-E Series
Страница 1: ...RG S2900G E Series Switch RGOS Configuration Guide Release 10 4 2b12 p1 ...
Страница 91: ...Configuration Guide Configuring PoE Configuration ...
Страница 133: ...Configuration Guide EEE Configuration ...
Страница 319: ...Configuration Guide QinQ Configuration ...
Страница 408: ......
Страница 409: ...IP Routing Configuration 1 Static Route Configuration ...
Страница 412: ......
Страница 413: ...Multicast Configuration 1 IGMP Snooping Configuration 2 MLD Snooping Configuration ...
Страница 621: ...Configuration Guide CPU Protection Configuration udp helper 180 4 dhcp client 180 4 lacp 180 4 ...
Страница 757: ......
Страница 758: ...ACL QoS Configuration 1 Access Control List Configuration 2 QoS Configuration ...
Страница 801: ...Reliability Configuration 1 RLDP Configuration 2 TPP Configuration 3 SEM Configuration ...
Страница 901: ...Configuration Guide ERSPAN Configuration ...
Страница 902: ...Web based Configuration 1 Web based Configuration ...