189/215
5.10 How to configure ACL to block unwanted traffic
The example shows administrators how to use ACL to block unwanted
traffic. We can set different criteria to identify unwanted traffic. The
example will use ACL to prevent only a single host in VLAN 10 from
accessing the Server.
Configure ACL to block unwanted traffic
Note:
All network IP addresses and subnet masks are used as examples in this article.
Please replace them with your actual network IP addresses and subnet masks. This
example was tested using XGS4600-32 (Firmware Version: V4.50).