EasyManuals Logo

Cisco 2950 - Catalyst Switch User Manual

Cisco 2950 - Catalyst Switch
710 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #536 background imageLoading...
Page #536 background image
29-2
Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide
78-11380-10
Chapter 29 Configuring Network Security with ACLs
Understanding ACLs
Understanding ACLs
Packet filtering can limit network traffic and restrict network use by certain users or devices. ACLs can
filter traffic as it passes through a switch and permit or deny packets at specified interfaces. An ACL is
a sequential collection of permit and deny conditions that apply to packets. When a packet is received
on an interface, the switch compares the fields in the packet against any applied ACLs to verify that the
packet has the required permissions to be forwarded, based on the criteria specified in the access lists.
The switch tests the packet against the conditions in an access list one by one. The first match determines
whether the switch accepts or rejects the packet. Because the switch stops testing conditions after the
first match, the order of conditions in the list is critical. If no conditions match, the switch rejects the
packet. If there are no restrictions, the switch forwards the packet; otherwise, the switch drops the
packet.
You configure access lists on a Layer 2 switch to provide basic security for your network. If you do not
configure ACLs, all packets passing through the switch could be allowed onto all parts of the network.
You can use ACLs to control which hosts can access different parts of a network or to decide which types
of traffic are forwarded or blocked at switch interfaces. For example, you can allow e-mail traffic to be
forwarded but not Telnet traffic. ACLs can be configured to block inbound traffic.
An ACL contains an ordered list of access control entries (ACEs). Each ACE specifies permit or deny
and a set of conditions the packet must satisfy in order to match the ACE. The meaning of permit or deny
depends on the context in which the ACL is used.
The switch supports these types of ACLs on physical interfaces in the inbound direction:
IP ACLs filter IP, TCP, and UDP traffic.
Ethernet or MAC ACLs filter Layer 2 traffic.
MAC extended access lists use source and destination MAC addresses and optional protocol type
information for matching operations.
Standard IP access lists use source addresses for matching operations.
Extended IP access lists use source and destination addresses and optional protocol type information
for matching operations.
The switch examines access lists associated with features configured on a given interface. As packets
enter the switch on an interface, ACLs associated with all inbound features configured on that interface
are examined.
ACLs permit or deny packet forwarding based on how the packet matches the entries in the ACL. For
example, you can use ACLs to allow one host to access a part of a network, but to prevent another host
from accessing the same part. In Figure 29-1, ACLs applied at the switch input allow Host A to access
the Human Resources network, but prevent Host B from accessing the same network.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 2950 - Catalyst Switch and is the answer not in the manual?

Cisco 2950 - Catalyst Switch Specifications

General IconGeneral
Forwarding Rate6.6 Mpps
Jumbo Frame SupportNo
Weight8.8 lbs (4 kg)
RAM16 MB
Flash Memory8 MB
ManageableYes
Form FactorRack-mountable
Ports24 Ethernet 10/100 ports
Uplink Ports2 x 10/100/1000Base-T ports
VLANs250
MAC Address Table Size8000
Power Supply100-240 VAC, 50-60 Hz
Dimensions4.4 cm x 44.5 cm x 24.2 cm
Operating Temperature0 to 40 °C (32 to 104 °F)
Storage Temperature-25 to 70 °C (-13 to 158 °F)
Operating Humidity10% to 85% (non-condensing)
Storage Humidity5% to 95% (non-condensing)

Related product manuals