Managing Device Security 
270
S3300 Smart Managed Pro Switch 
Configure Access Control Lists
Access control lists (ACLs) ensure that only authorized users have access to specific 
resources while blocking off any unwarranted attempts to reach network resources. ACLs are 
used to provide traffic flow control, restrict contents of routing updates, decide which types of 
traffic are forwarded or blocked, and above all provide security for the network. Switch 
software supports IPv4 and MAC ACLs.
To configure an ACL, first create an IPv4-based or MAC-based ACL ID. Then, create a rule 
and assign it to a unique ACL ID. Next, define the rules, which can identify protocols, source, 
and destination IP and MAC addresses, and other packet-matching criteria. Finally, use the 
ID number to assign the ACL to a port or to a LAG.
To view ACL configuration examples, see Access Control Lists on page 340.
The ACL configuration menu contains links to the features described in the following 
sections.
• ACL Wizard on page 271
• Basic
• MAC ACL on page 274
• MAC Rules on page 274
• MAC Binding Configuration on page 277
• MAC Binding Table on page 278
• Advanced
• IP ACL on page 279
• IP Rules on page 280
• IP Extended Rules on page 282
• IPv6 ACL on page 286
• IPv6 Rules on page 287
• IP Binding Configuration on page 289
• IP Binding Table on page 290
• VLAN Binding Table on page 290