Asante Technologies IC36240 user manual Using a Classification ACL

Models: IC36240

1 108
Download 108 pages 14.72 Kb
Page 58
Image 58

When configuring an access list, you can add multiple statements by adding criteria to the same numbered list. The order of the statements is important, as the switch tests addresses against the criteria in an access list one by one (in the order the statements are entered) until it finds a match. The first match determines whether the system accepts or rejects the address. Because the system stops testing conditions after the first match, the order of the conditions is critical.

To develop an ACL first determine the protocols required within your networks. Although every site has specific requirements, certain protocols and applications are widely used. For example, network segments that provide connectivity for a publicly accessible web server or TCP.

Use the following sources to identify required traffic. The number of instances of applied access lists usually will not exceed 128 due to hardware limitations.

Review local security policy

Review firewall configuration

Review applications

Using a Classification ACL

A classification ACL is composed of permit statements for the various protocols that could be destined to the internal network. (See for a list of commonly used protocols and applications.) Use the show access-listcommand to display a count of access control entry (ACE) hits to identify required protocols. Investigate and understand and suspicious or surprising results before you create explicit permit statements for unexpected protocols.

In addition to direct protection, the ACL should also provide a first line of defense against certain types of invalid traffic on the Internet.

58

Asante IntraCore IC36240

User’s Manual

Page 58
Image 58
Asante Technologies IC36240 user manual Using a Classification ACL