Chapter 1 Acl Configuration; Acl Overview - H3C S3100 Series Operation Manual

For soliton - acl
Hide thumbs Also See for S3100 Series:
Table of Contents

Advertisement

Operation Manual (For Soliton) – ACL
H3C S3100 Series Ethernet Switches

Chapter 1 ACL Configuration

1.1 ACL Overview

As the network scale and network traffic are increasingly growing, security control and
bandwidth assignment play a more and more important role in network management.
Filtering data packets can prevent a network from being accessed by unauthorized
users efficiently while controlling network traffic and saving network resources. Access
control lists (ACL) are often used to filter packets with configured matching rules.
Upon receiving a packet, the switch compares the packet with the rules of the ACL
applied on the current port to permit or discard the packet.
The rules of an ACL can be referenced by other functions that need traffic classification,
such as QoS.
ACLs classify packets using a series of conditions known as rules. The conditions can
be based on source addresses, destination addresses and port numbers carried in the
packets.
According to their application purposes, ACLs fall into the following four types.
Basic ACL. Rules are created based on source IP addresses only.
Advanced ACL. Rules are created based on the Layer 3 and Layer 4 information
such as the source and destination IP addresses, type of the protocols carried by
IP, protocol-specific features, and so on.
Layer 2 ACL. Rules are created based on the Layer 2 information such as source
and destination MAC addresses, VLAN priorities, type of Layer 2 protocol, and so
on.
User-defined ACL. An ACL of this type matches packets by comparing the strings
retrieved from the packets with specified strings. It defines the byte it begins to
perform "and" operation with the mask on the basis of packet headers.
Note:
S3100 Series Ethernet switches match IPv6 packets by user-defined ACLs. In the
following sections, user-defined ACLs are referred to as IPv6 ACLs. For details about
IPv6 ACL, refer to section
1.2.5 Configuring an IPv6
1-1
Chapter 1 ACL Configuration
ACL.

Advertisement

Table of Contents
loading

Table of Contents