EasyManua.ls Logo

HP V1910 Switch Series User Manual

HP V1910 Switch Series
470 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #415 background imageLoading...
Page #415 background image
401
ACL configuration
ACL overview
With the growth of network scale and network traffic, network security and bandwidth allocation
become more and more critical to network management. Packet filtering can be used to efficiently
prevent illegal access to networks and to control network traffic and save network resources. One way to
implement packet filtering is to use access control lists (ACLs).
An ACL is a set of rules (or a set of permit or deny statements) for determining which packets can pass
and which ones should be rejected based on match criteria such as source address, destination address,
and port number. ACLs are widely used with technologies such as QoS, where traffic identification is
desired.
Introduction to IPv4 ACL
IPv4 ACL classification
IPv4 ACLs, identified by ACL numbers, fall into the following categories, as shown in Table 145.
Table 145 IPv4 ACL categories
Cate
g
or
y
ACL number Match criteria
Basic IPv4 ACL
2000 to 2999
Source IP address
Advanced IPv4 ACL
3000 to 3999
Source IP address, destination IP address, protocol
carried over IP, and other Layer 3 or Layer 4 protocol
header information
Ethernet frame header ACL
4000 to 4999
Layer 2 protocol header fields such as source MAC
address, destination MAC address, 802.1p
precedence, and link layer protocol type
IPv4 ACL match order
An ACL may consist of multiple rules, which specify different match criteria. These match criteria may
have overlapping or conflicting parts. The match order determines how packets should be matched
against the rules. The comparison of a packet against ACL rules stops immediately after a match is found.
The packet is then processed as per the rule.
The following types of IPv4 ACL match orders are available:
 config—Compares packets against ACL rules in the order that the rules are configured.
 auto—Compares packets against ACL rules in the depth-first match order.
The term depth-first match has different meanings for different types of IPv4 ACLs.

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the HP V1910 Switch Series and is the answer not in the manual?

HP V1910 Switch Series Specifications

General IconGeneral
Product SeriesV1910
VLAN SupportYes
QoSYes
Ports8, 24, or 48 10/100/1000 ports
MAC Address Table Size8K entries
Power SupplyInternal power supply
Jumbo Frame SupportYes
Operating Humidity10% to 90% (non-condensing)

Summary

Configuration through the web interface

Default login information

Provides the default username and password for accessing the web interface.

Configuration at the CLI

Getting started with the CLI

Introduces using the Command Line Interface for device management.

Device maintenance

Software upgrade

Describes the process of upgrading the system software.

Port management configuration

Configuring a port

Guides through setting port operation parameters.

User management

Configuring users

Describes adding and managing local user accounts and groups.

SNMP configuration

Enabling SNMP

Guides on enabling and configuring SNMP settings.

VLAN configuration

Creating VLANs

Details the process of creating new VLANs.

MAC address configuration

MSTP configuration

Link aggregation and LACP configuration

Configuring link aggregation and LACP

Guides on setting up link aggregation and LACP.

DHCP overview

DHCP snooping configuration

Functions of DHCP snooping

Lists recording IP-to-MAC and ensuring authorized servers.

Diagnostic tools

Ping

Explains the ping command for verifying reachability.

Trace route

Describes the trace route command for tracing IP packets.

ARP management

ARP attack defense configuration

ARP detection

Introduces ARP detection to prevent man-in-the-middle attacks.

802.1X configuration

Configuring 802.1X globally

Guides on enabling and configuring 802.1X authentication globally.

AAA configuration

Introduction to AAA

Introduces Authentication, Authorization, and Accounting.

RADIUS configuration

Users

PKI configuration

ACL configuration

QoS configuration

PoE configuration

Related product manuals