Assistance in the Protection from Un-
authorized Access
UM Basic Configuration L3P
Release
7.1
12/2011
6.8
Access Control Lists (ACL)
109
6.8 Access Control Lists (ACL)
With Access Control Lists (ACL), you can filter, forward,redirect or prioritise
received data packets. The device provides
MAC-based ACLs and
IP-based ACLs.
The device takes account of the ACLs when packets are received. This is
why these lists are called Ingress ACLs.
You can configure the Access Control Lists using the Command Line
Interface. For details, please refer to the "Command Line Interface
Reference Manual".
The device provides the following ACL capabilities:
up to 100 ACLs,
10 rules per ACL,
up to 100 rules per interface,
up to 1000 rules for all interfaces together
possible actions:
– Permit and Deny,
– in combination with Permit: prioritise (assign queue) and redirect, i.e.
when a rule is applied, the data packet is forwarded to the specified
interface.
"deny all“ is always the last rule (hidden). This rule is applied if no other
rules are applied to the related interface.
The configuration of ACLs consists of the following steps:
First define ACL and then
attach the ACL to one or all interfaces.
You can attach ACLs to all physical ports and to all link aggregation
interfaces.