Using Acls; Applying Acls To Interfaces - Cabletron Systems IA1100 User's Reference Manual

Internet appliance
Hide thumbs Also See for IA1100:
Table of Contents

Advertisement

Chapter 13: Access Control List Configuration Guide

Using ACLs

It is important to understand that an ACL is simply a definition of packet characteristics
specified in a set of rules. An ACL must be enabled in one of the following ways:
Applying an ACL to an interface, which permits or denies traffic to or from the IA.
ACLs used in this way are known as Interface ACLs.
Applying an ACL to a service, which permits or denies access to system services
provided by the IA. ACLs used in this way are known as Service ACLs.
Associating an ACL with ip-policy, nat, port mirroring, rate-limit, or web-cache
commands, which specifies the criteria that packets, addresses, or flows must meet in
order to be relevant to these IA features. ACLs used in this way are known as Profile
ACLs.
These uses of ACLs are described in the following sections.

Applying ACLs to Interfaces

An ACL can be applied to an interface to examine either inbound or outbound traffic.
Inbound traffic is traffic coming into the IA. Outbound traffic is traffic going out of the IA.
For each interface, only one ACL can be applied for the same protocol in the same
direction. For example, you cannot apply two or more IP ACLs to the same interface in the
inbound direction. You can apply two ACLs to the same interface if one is for inbound
traffic and one is for outbound traffic, but not in the same direction. However, this
restriction does not prevent you from specifying many rules in an ACL. You just have to
put all of these rules into one ACL and apply it to an interface.
When a packet comes into the IA at an interface where an inbound ACL is applied, the IA
compares the packet to the rules specified by that ACL. If it is permitted, the packet is
allowed into the IA. If not, the packet is dropped. If that packet is to be forwarded to go
out of another interface (that is, the packet is to be routed) then a second ACL check is
possible. At the output interface, if an outbound ACL is applied, the packet will be
compared to the rules specified in this outbound ACL. Consequently, it is possible for a
packet to go through two separate checks, once at the inbound interface and once more at
the outbound interface.
In general, you should try to apply ACLs at the inbound interfaces instead of the
outbound interfaces. If a packet is to be denied, you want to drop the packet as early as
possible, at the inbound interface. Otherwise, the IA will have to process the packet,
determine where the packet should go only to find out that the packet should be dropped
at the outbound interface. In some cases, however, it may not be simple or possible for the
administrator to know ahead of time that a packet should be dropped at the inbound
interface. Nonetheless, for performance reasons, whenever possible, you should create
and apply an ACL to the inbound interface.
218
Internet Appliance User Reference Manual

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ia1200

Table of Contents