C a u t i o n
Note
Preventing the use of specific TCP or UDP functions (such as Telnet,
■
SSH, web browser) for unauthorized access
You can also enhance switch management security by using ACLs to block
inbound IP traffic that has the switch itself as the destination address (DA).
ACLs can enhance network security by blocking selected IP traffic, and can
serve as one aspect of maintaining network security. However, because ACLs
do not provide user or device authentication, or protection from malicious
manipulation of data carried in IP packet transmissions, they should not
be relied upon for a complete security solution.
ACLs do not screen non-IP traffic such as AppleTalk and IPX.
Guidelines for Planning the Structure of an ACL
The first step in planning a specific ACL is to determine where you will apply
it. (Refer to "ACL Inbound Application Points" on page 9-9.) You must then
determine the order in which you want the individual ACEs in the ACL to filter
traffic. Some applications require high usage of the resources the switch uses
to support ACLs. In these cases it is important to order the individual ACEs
in a list to avoid unnecessarily using resources. For more on this topic, refer
to "Planning an ACL Application" on page 9-16.
The first match dictates the action on a packet. possible, subsequent
■
matches are ignored.
■
On any ACL, the switch implicitly denies packets that are not explic
itly permitted or denied by the ACEs configured in the ACL. If you
want the switch to forward a packet for which there is not a match in
an ACL, add permit any as the last ACE in an ACL. This ensures that
no packets reach the implicit deny any case.
■
Generally, you should list ACEs from the most specific (individual
hosts) to the most general (subnets or groups of subnets) unless doing
so permits traffic that you want dropped. For example, an ACE
allowing a small group of workstations to use a specialized printer
should occur earlier in an ACL than an entry used to block widespread
access to the same printer.
Traffic Management and Improved Network Performance
Access Control Lists (ACLs)
9-23
Need help?
Do you have a question about the 2610 and is the answer not in the manual?
Questions and answers