Configure Access Control Lists; Use The Acl Wizard To Create A Simple Acl - NETGEAR GC110 User Manual

Insight managed 8-port gigabit ethernet smart cloud switch with 2 sfp fiber ports
Hide thumbs Also See for GC110:
Table of Contents

Advertisement

Insight Managed 8-Port Gigabit Ethernet Smart Cloud Switch with 2 SFP Fiber Ports
You can specify the VLAN range values separated by a hyphen, for example, 10-13. You
can specify the combination of both separated by commas, for example,
12,15,40-43,1000-1005, 2000. The range of VLAN IDs is 2–4093.
Note:
The VLAN ID list that you specify replaces the configured secondary
VLAN list in the association.
10.
Click the Apply button.
Your settings are saved.
The Operational VLAN(s) field displays the operational VLANs.

Configure Access Control Lists

Access control lists (ACLs) ensure that only authorized users can access specific resources
while blocking off any unwarranted attempts to reach network resources. ACLs are used to
provide traffic flow control, restrict contents of routing updates, decide which types of traffic
are forwarded or blocked, and above all provide security for the network. The switch's
software supports IPv4, IPv6, and MAC ACLs.
To configure an ACL:
1.
Create an IPv4-based or IPv6-based or MAC-based ACL ID.
2.
Create a rule and assign it to a unique ACL ID.
3.
Define the rules, which can identify protocols, source, and destination IP and MAC
addresses, and other packet-matching criteria.
4.
Use the ID number to assign the ACL to a port or to a LAG.
To view ACL configuration examples, see

Use the ACL Wizard to Create a Simple ACL

The ACL Wizard helps you create a simple ACL and apply it to the selected ports easily and
quickly. First, select an ACL type to use when you create an ACL. Then add an ACL rule to
this ACL and apply this ACL on the selected ports. The ACL Wizard allows you to create the
ACL, but does not allow you to modify it. For information about modifying an ACL, see
an ACL Rule
on page 247.
Note:
The steps in the following procedure describe how you can create an
ACL based on the destination MAC address. If you select a different
type of ACL (for example, an ACL based on a source IPv4), the page
displays different information.
Access Control Lists (ACLs)
Manage Device Security
243
on page 350.
Modify

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Gc110pGc510pGc510pp

Table of Contents