Table of Contents

1ACL Configuration·····································································································································1-1ACL Overview ·········································································································································1-1 ACL Matching Order························································································································1-1 Ways to Apply an ACL on a Device ································································································1-2 Types of ACLs Supported by Devices·····························································································1-3 ACL Configuration···································································································································1-3 Configuring Time Range··················································································································1-3 Configuring Basic ACL ····················································································································1-5 Configuring Advanced ACL ·············································································································1-6 Configuring Layer 2 ACL ·················································································································1-7 ACL Assignment ·····································································································································1-8 Assigning an ACL Globally··············································································································1-9 Assigning an ACL to a VLAN ··········································································································1-9 Assigning an ACL to a Port Group ································································································1-10 Assigning an ACL to a Port ···········································································································1-11 Displaying and Maintaining ACL ···········································································································1-11 Examples for Upper-layer Software Referencing ACLs········································································1-12 Example for Controlling Telnet Login Users by Source IP····························································1-12 Example for Controlling Web Login Users by Source IP·······························································1-12 Examples for Applying ACLs to Hardware····························································································1-13 Basic ACL Configuration Example ································································································1-13 Advanced ACL Configuration Example·························································································1-13 Layer 2 ACL Configuration Example·····························································································1-14 Example for Applying an ACL to a VLAN······················································································1-15

i

Page 343
Image 343
3Com WX3000 operation manual Table of Contents