Configuring Access Control Lists; Basic - NETGEAR GSM7252PS - ProSafe 52 Ports Gigabit Ethernet L2 Managed Stackable Switch User Manual

Prosafe gigabit l3 managed switch web management user manual
Hide thumbs Also See for GSM7252PS - ProSafe 52 Ports Gigabit Ethernet L2 Managed Stackable Switch:
Table of Contents

Advertisement

ProSafe® Gigabit L3 Managed Stackable Switches Software Administration Manual

Configuring Access Control Lists

Access Control Lists (ACLs) ensure that only authorized users have access to specific
resources while blocking off any unwarranted attempts to reach network resources. ACLs are
used to provide traffic flow control, restrict contents of routing updates, decide which types of
traffic are forwarded or blocked, and above all provide security for the network. ProSafe®
Managed Switches software supports IPv4 and MAC ACLs.
You first create an IPv4-based or MAC-based ACL ID. Then, you create a rule and assign it
to a unique ACL ID. Next, you define the rules, which can identify protocols, source, and
destination IP and MAC addresses, and other packet-matching criteria. Finally, use the ID
number to assign the ACL to a port or to a LAG.
The Security
ACL folder contains links to the following features:

Basic

The Basic folder contains links to the following features:
MAC ACL
on page 524
MAC Rules
on page 526
MAC Binding Configuration
MAC Binding Table
MAC ACL
A MAC ACL consists of a set of rules which are matched sequentially against a packet. When
a packet meets the match criteria of a rule, the specified rule action (Permit/Deny) is taken
and the additional rules are not checked for a match. On this menu the interfaces to which an
MAC ACL applies must be specified, as well as whether it applies to inbound or outbound
traffic. Rules for the MAC ACL are specified/created using the MAC ACL Rule Configuration
menu.
There are multiple steps involved in defining a MAC ACL and applying it to the switch:
1.
Use the
MAC ACL
2.
Use the
MAC Rules
3.
Use the
MAC Binding Configuration
4.
Optionally, use the
524 |
Chapter 6. Managing Device Security
on page 528
on page 530
page to create the ACL ID.
page to create rules for the ACL.
page to assign the ACL by its ID number to a port.
MAC Binding Table
page to view the configurations.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Gsm7228psProsafe gsm7352s

Table of Contents