Access Policies; Overview Of Access Policies; Access Control Lists; Rate Limits - Extreme Networks Summit 300-48 Software User's Manual

Extreme summit 300-48: software user guide
Hide thumbs Also See for Summit 300-48:
Table of Contents

Advertisement

10

Access Policies

This chapter describes the following topics:
• Overview of Access Policies on page 147
• Using Access Control Lists on page 147

Overview of Access Policies

Access policies are a generalized category of features that impact forwarding and route forwarding
decisions. Access policies are used primarily for security and quality of service (QoS) purposes.
The three categories of access policies are:

• Access control lists

• Rate limits

Access Control Lists
Access control lists are used to perform packet filtering and forwarding decisions on incoming traffic.
Each packet arriving on an ingress port is compared to the access list in sequential order and is either
forwarded to a specified QoS profile or dropped. These forwarded packets can also be modified by
changing the 802.1p value and/or the DiffServe code point. Using access lists has no impact on switch
performance.
Rate Limits
Rate limits are almost identical to access control lists. Incoming packets that match a rate limit access
control list are allowed as long as they do not exceed a pre-defined rate. Excess packets are either
dropped, or modified by resetting their DiffServ code point.

Using Access Control Lists

Each access control list consists of an access mask that selects which fields of each incoming packet to
examine, and a list of values to compare with the values found in the packet. Access masks can be
Summit 300-48 Switch Software User Guide
147

Advertisement

Table of Contents
loading

Table of Contents