Configuring And; Onfiguring And Anaging Ecurity Acl; About Security Access Control Lists; Overview Of Security Acl Commands - 3Com 3CRWX120695A, 3CRWX440095A Configuration Manual

Wireless lan switch and controller
Table of Contents

Advertisement

11
About Security
Access Control Lists
Overview of Security
ACL Commands
C
ONFIGURING AND
S
ECURITY
A security access control list (ACL) filters packets for the purpose of
discarding them, permitting them, or permitting them with modification
(marking) for class-of-service (CoS) priority treatment. A typical use of
security ACLs is to enable users to send and receive packets within the
local intranet, but restrict incoming packets to the server in which
confidential salary information is stored.
3Com provides a very powerful mapping application for security ACLs. In
addition to being assigned to physical ports, VLANs, virtual ports in a
VLAN, or Distributed MAPs, ACLs can be mapped dynamically to a user's
session, based on authorization information passed back from the AAA
server during the user authentication process.
Figure 9 provides a visual overview of the way you use MSS commands to
set a security ACL, commit the ACL so it is stored in the configuration,
and map the ACL to a user session, VLAN, port, virtual port, or
Distributed MAP.
M
ACL
S
ANAGING

Advertisement

Table of Contents
loading

Table of Contents