82CHAPTER 4: MANAGING DEVICE SECURITY

Defining Access

Access Control Lists (ACLs) allow network managers to define

Control Lists

classification actions and rules for specific ingress ports. Packets entering

 

an ingress port, with an active ACL are either admitted or denied entry.

 

For example, an ACL rule states that port number 20 can receive TCP

 

packets, however, if a UDP packet is received, the packet will be dropped.

 

ACLs are composed of access control entries (ACEs) that are made of the

 

filters that determine traffic classifications.

The following are examples of filters that can be defined as ACEs:

Source Port IP Address and Wildcard Mask — Filters packets by the source port IP address and wildcard mask.

Destination Port IP Address and Wildcard Mask — Filters packets by the destination port IP address and wildcard mask.

Protocol — Filters packets by the IP protocol.

DSCP — Filters packets by the DiffServ Code Point (DSCP) value.

IP Precedence — Filters packets by the IP Precedence.

Action — Indicates the action assigned to the packet matching the ACL. Packets are forwarded or dropped.

This section includes the following topics:

Viewing MAC Based ACLs

Configuring MAC Based ACLs

Removing MAC Based ACLs

Viewing IP Based ACLs

Defining IP Based ACLs

Removing IP Based ACLs

Viewing ACL Binding

Configuring ACL Binding

Removing ACL Binding

Page 82
Image 82
3Com 3CRDSF9PWR manual Defining Access, Access Control Lists ACLs allow network managers to define