EasyManua.ls Logo

3Com OfficeConnect 3CDSG10PWR - Access Control Lists (ACLs)

3Com OfficeConnect 3CDSG10PWR
248 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
62 CHAPTER 4: MANAGING DEVICE SECURITY
Defining Access
Control Lists
Access Control Lists (ACLs) allow network managers to define
classification actions and rules for specific ingress ports. Packets entering
an ingress port, with an active ACL are either admitted or denied entry. If
they are denied entry, the user can disable the port.
For example, an ACL rule is defined states that port number 20 can
receive TCP packets, however, if a UDP packet is received, the packet is
dropped. ACLs are composed of access control entries (ACEs) that are
made of the filters that determine traffic classifications.
The following are examples of filters that can be defined as ACEs:
Source Port IP Address and Wildcard Mask — Filters the packets
by the source port IP address and wildcard mask.
Destination Port IP Address and Wildcard Mask — Filters the
packets by the destination port IP address and wildcard mask.
ACE Priority — Filters the packets by the ACE priority.
ProtocolFilters the packets by the IP protocol.
DSCP — Filters the packets by the DiffServ Code Point (DSCP) value.
IP Precedence — Filters the packets by the IP Precedence.
Action — Indicates the action assigned to the packet matching the
ACL. Packets are forwarded or dropped. In addition, the port can be
shut down, a trap can be sent to the network administrator, or packet
is assigned rate limiting restrictions for forwarding.
This section includes the following topics:
Viewing MAC Based ACLs
Configuring MAC Based ACLs
Removing MAC Based ACLs
Viewing IP Based ACLs
Defining IP Based ACLs
Modifying IP Based ACLs
Removing IP Based ACLs
Viewing ACL Binding
Configuring ACL Binding
Removing ACL Binding

Table of Contents

Related product manuals