Racl Applications - HP E3800-24G-PoE+-2SFP+ Access Security Manual

Switch software
Hide thumbs Also See for E3800-24G-PoE+-2SFP+:
Table of Contents

Advertisement

IPv4 Access Control Lists (ACLs)
Overview
10-14
Routed IPv4 traffic having a destination address (DA) on the switch
itself. In figure 10-1 on page 10-15, this is any of the IP addresses
shown in VLANs "A", "B", and "C". (Routing need not be enabled.)
outbound traffic generated by the switch itself.
VLAN ACL (VACL): on a VLAN configured with a VACL, inbound IP
traffic, regardless of whether it is switched or routed. On a multi-
netted VLAN, this includes inbound IPv4 traffic from any subnet.
Static port ACL: any inbound IPv4 traffic on that port.
RADIUS-assigned ACL: on a port having an ACL assigned by a
RADIUS server to filter an authenticated client's traffic, filters
inbound IPv4 and IPv6 traffic from that client
(For information on RADIUS-assigned ACLs, refer to chapter 7,
"Configuring RADIUS Server Support for Switch Services".)
Connection-Rate ACL: An optional feature used with Connection-
Rate filtering based on virus-throttling technology. Refer to chapter
3, "Virus Throttling".

RACL Applications

RACLs filter routed IPv4 traffic entering or leaving the switch on VLANs
configured with the "in" and/or "out" ACL option
vlan < vid > ip access-group < identifier > < in | out >
For example, in figure 10-1:
You would assign either an inbound ACL on VLAN 1 or an outbound
ACL on VLAN 2 to filter a packet routed between subnets on different
VLANs; that is, from the workstation 10.28.10.5 on VLAN 1 to the
server at 10.28.20.99 on VLAN 2. (An outbound ACL on VLAN 1 or an
inbound ACL on VLAN 2 would not filter the packet.)
Where multiple subnets are configured on the same VLAN, you can
use either inbound or outbound ACLs to filter routed IPv4 traffic
between the subnets on the VLAN. (Traffic source and destination IP
addresses must be on devices external to the switch.)

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents