Configuring and Managing
Security ACLs
Mapping Security ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365
About Security Access Control Lists
A security access control list (ACL) filters packets for the purpose of discarding them, permitting them, or permitting
them with modification (marking) for class-of-service (CoS) priority treatment. A typical use of security ACLs is to
enable users to send and receive packets within the local intranet, but restrict incoming packets to the server in which
confidential salary information is stored.
Nortel provides a very powerful mapping application for security ACLs. In addition to being assigned to physical ports,
VLANs, virtual ports in a VLAN, or Distributed APs, ACLs can be mapped dynamically to a user's session, based on
authorization information passed back from the AAA server during the user authentication process.
Nortel WLAN Security Switch 2300 Series Configuration Guide
351