3Com 4500 Configuration Manual page 406

26/50-port
Hide thumbs Also See for 4500:
Table of Contents

Advertisement

ACL Overview ·········································································································································1-1
ACL Matching Order························································································································1-1
Ways to Apply an ACL on a Switch·································································································1-2
Types of ACLs Supported by Switch 4500 Series ··········································································1-3
ACL Configuration Task List ···················································································································1-3
Configuring Time Range··················································································································1-3
Configuring Basic ACL ····················································································································1-5
Configuring Advanced ACL ·············································································································1-6
Configuring Layer 2 ACL ·················································································································1-7
Configuring User-defined ACL ········································································································1-8
Applying ACL Rules on Ports ········································································································1-10
Applying ACL rules to Ports in a VLAN ·························································································1-10
Displaying and Maintaining ACL Configuration ····················································································1-11
Examples for Upper-layer Software Referencing ACLs········································································1-11
Example for Controlling Telnet Login Users by Source IP ····························································1-11
Example for Controlling Web Login Users by Source IP·······························································1-12
Examples for Applying ACLs to Hardware····························································································1-12
Basic ACL Configuration Example ································································································1-12
Advanced ACL Configuration Example ·························································································1-13
Layer 2 ACL Configuration Example ·····························································································1-14
User-defined ACL Configuration Example ····················································································1-15
Example for Applying an ACL to a VLAN ······················································································1-15
Table of Contents
i

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

4500 pwr

Table of Contents