Configuring Access Control Lists; Ip Access Control Lists - Ubiquiti EdgeSwitch ES-24-250W Administration Manual

User interface for poe switches
Hide thumbs Also See for EdgeSwitch ES-24-250W:
Table of Contents

Advertisement

EdgeSwitch
Administration Guide
Configuring Quality of Service

Configuring Access Control Lists

Access Control Lists (ACLs) ensure that only authorized users have access to specific resources while blocking
off any unwarranted attempts to reach network resources. ACLs are used to provide traffic flow control,
restrict contents of routing updates, decide which types of traffic are forwarded or blocked, and above all
provide security for the network. The EdgeSwitch software supports IPv4 and MAC ACLs. The total number of
MAC and IP ACLs supported by the EdgeSwitch software is platform-specific.
You first create an IPv4-based or MAC-based rule and assign a unique ACL ID. Then, you define the rules,
which can identify protocols, source and destination IP and MAC addresses, and other packet-matching
criteria. Finally, you use the ID number to assign the ACL to a port or to a VLAN interface.

IP Access Control Lists

IP access control lists (ACL) allow network managers to define classification actions and rules for specific
ports. ACLs are composed of access control entries (ACE), or rules, that consist of the filters that determine
traffic classifications. The total number of rules that can be defined for each ACL is platform-specific. These
rules are matched sequentially against a packet. When a packet meets the match criteria of a rule, the
specified rule action (Permit/Deny) is taken, including dropping the packet or disabling the port, and the
additional rules are not checked for a match. For example, a network administrator defines an ACL rule that
says port number 20 can receive TCP packets. However, if a UDP packet is received the packet is dropped.
The IP Access Control List folder contains links to UI pages that allow you to configure and view IP ACLs.
To configure an IP ACL:
1. Use the IP ACL Configuration page to define the IP ACL type and assign an ID to it.
2. Use the Access Control List Interface Summary page to create rules for the ACL.
3. Use the Access Control List Configuration page to view the configuration.
Ubiquiti Networks, Inc.
230

Advertisement

Table of Contents
loading

Table of Contents