Access Control Lists (ACL)

You use Access Control Lists (ACLs) to control the traffic entering or exiting a network, for example where two networks are connected, or an internal network is connected through a firewall router to the Internet. This allows you to ensure that only authorized users have access to specific resources while blocking off any unwarranted attempts to reach them.

You can use ACLs to:

Provide traffic flow control

Determine which types of traffic will be forwarded or blocked

Provide network security

An ACL consists of one or more rules or filtering criteria. A packet is accepted or rejected based on whether or not it matches the criteria. After you create the set of rules for an ACL, you attach the ACL to an interface. Filtering is done on inbound traffic.

An ACL rule may apply to any one or more of the following fields:

Source IP address

Source Port (Layer 4)

Destination IP

Destination Port (Layer 4)

IP Protocol Number

An ‘implicit deny’ rule is added to the end of every ACL. This means that if a packet does not match

any of the rules you have defined it will be dropped.

Intel® Blade Server Ethernet Switch Module IXM5414E

39

Page 49
Image 49
Intel IXM5414E manual Access Control Lists ACL