i
Table of Contents
1 ACL Configuration·····································································································································1-1
ACL Overview ·········································································································································1-1
ACL Matching Order························································································································1-1
Ways to Apply an ACL on a Switch·································································································1-2
Types of ACLs Supported by S5100 Series Ethernet Switches ·····················································1-3
ACL Configuration···································································································································1-3
Configuring Time Range··················································································································1-3
Configuring Basic ACL ····················································································································1-5
Configuring Advanced ACL·············································································································1-6
Configuring Layer 2 ACL·················································································································1-7
ACL Assignment ·····································································································································1-8
Assigning an ACL Globally··············································································································1-9
Assigning an ACL to a VLAN ··········································································································1-9
Assigning an ACL to a Port Group ································································································1-10
Assigning an ACL to a Port ···········································································································1-11
Displaying ACL Configuration···············································································································1-12
Example for Upper-layer Software Referencing ACLs ·········································································1-12
Example for Controlling Telnet Login Users by Source IP····························································1-12
Example for Controlling Web Login Users by Source IP·······························································1-13
Example for Applying ACLs to Hardware······························································································1-13
Basic ACL Configuration Example ································································································1-13
Advanced ACL Configuration Example·························································································1-14
Layer 2 ACL Configuration Example·····························································································1-15
Example for Applying an ACL to a VLAN······················································································1-15