EasyManua.ls Logo

HP ProCurve 5308xl - 9 Access Control Lists (ACLs) for the Series 5300 xl Switches

HP ProCurve 5308xl
664 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
9
Access Control Lists (ACLs) for the Series
5300xl Switches
Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-3
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-8
Types of IP ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-8
ACL Inbound and Outbound Application Points . . . . . . . . . . . . . . . . . . 9-8
Features Common to All ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-9
General Steps for Planning and Configuring ACLs . . . . . . . . . . . . . . . 9-10
ACL Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-12
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-12
The Packet-Filtering Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-13
Planning an ACL Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-16
Traffic Management and Improved Network Performance . . . . . . . . 9-16
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-17
Guidelines for Planning the Structure of an ACL . . . . . . . . . . . . . . . . 9-18
ACL Configuration and Operating Rules . . . . . . . . . . . . . . . . . . . . . . . 9-18
How an ACE Uses a Mask To Screen Packets for Matches . . . . . . . . 9-20
What Is the Difference Between Network (or Subnet)
Masks and the Masks Used with ACLs? . . . . . . . . . . . . . . . . . . . . 9-20
Rules for Defining a Match Between a Packet and an
Access Control Entry (ACE)
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-21
Configuring and Assigning an ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-25
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-25
General Steps for Implementing ACLs . . . . . . . . . . . . . . . . . . . . . 9-25
Types of ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-26
9-1

Table of Contents

Related product manuals