i 
Table of Contents 
1 ACL Configuration·····································································································································1-1 
ACL Overview ·········································································································································1-1 
ACL Matching Order························································································································1-1 
Ways to Apply an ACL on a Switch·································································································1-2 
Types of ACLs Supported by Switch 4200G Series········································································1-3 
ACL Configuration···································································································································1-3 
Configuring Time Range··················································································································1-3 
Configuring Basic ACL ····················································································································1-4 
Configuring Advanced ACL·············································································································1-5 
Configuring Layer 2 ACL·················································································································1-7 
ACL Assignment ·····································································································································1-8 
Assigning an ACL Globally··············································································································1-9 
Assigning an ACL to a VLAN ··········································································································1-9 
Assigning an ACL to a Port Group ································································································1-10 
Assigning an ACL to a Port ···········································································································1-10 
Displaying ACL Configuration···············································································································1-11 
Example for Upper-layer Software Referencing ACLs ·········································································1-12 
Example for Controlling Telnet Login Users by Source IP····························································1-12 
Example for Controlling Web Login Users by Source IP·······························································1-12 
Example for Applying ACLs to Hardware······························································································1-13 
Basic ACL Configuration Example ································································································1-13 
Advanced ACL Configuration Example·························································································1-14 
Layer 2 ACL Configuration Example·····························································································1-14 
Example for Applying an ACL to a VLAN······················································································1-15